Chapter 3 & 4 Ethical Hacking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which type of program can mitigate some risks associated with malware?

antivirus

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

Keyloggers

Which tool can be used to gather competitive intelligence from Web sites?

Metis

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Network security

Which HTTP method requests that the entity is stored under the Request-URI?

PUT

Which HTTP method starts a remote Application-layer loopback of the request message?

TRACE

What 1-pixel x 1-pixel image file is referenced in an tag, and usually works with a cookie to collect information about the person visiting the Website?

Web bug

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

heuristics

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

nc -h

Which type of social engineering attack attempts to discover personal information through the use of email?

phishing

Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

rootkit

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

signatures

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

social engineering

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

spear phishing

Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)?

CONNECT


Set pelajaran terkait

Cyber War Gaming Midterm Two Review

View Set

psych 2400 exam 2 revel questions

View Set

Pharmacology Semester 3 Midterm 2

View Set

CCBC CRJU 101 modules 1-6 midterm exam

View Set

Chapter 04: Managing Ethics and Social Responsibility

View Set