CIT 182 - Chapter Three Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following sometimes displays a banner that notifies the user of its presence?

Adware

Type of program can mitigate some risks associated with malware.

Anti-virus.

The virus signature file is maintained by what type of software?

Antivirus

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

Backdoor

Network of robot computers.

Botnet.

When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

Buffer Overflow

What physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

Card Access

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

Denial-of-Service

An attack that prevents legitimate users from accessing network resources.

DoS.

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

Eavesdropping

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

Heuristics

The acronym IDS stands for what?

Intrusion Detection System

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

Keyloggers

Hardware devices or software that can be used to capture keystrokes on a computer.

Keyloggers.

Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

Macro

Malicious software introduced into a network to help an attacker accomplish their goals.

Malware.

What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

Man-in-the-Middle

Attackers inject themselves between two parties or systems communicating with one another.

Man-in-the-Middle.

Which type of security is specifically concerned with computers and devices that are part of a network infrastructure?

Network Security

What type of attack causes the victim's computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

Ping of Death

An attack that uses a large ICMP packet to cause the victim computer to freeze and malfunction.

Ping of Death.

What type of virus is used to lock a user's system, or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

Ransomware

Virus that locks a target system until a demanded fee is paid.

Ransomware.

Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

Rootkit

A program that usually hides in the OS tools, so it's almost impossible to detect.

Rootkit.

Which type of attack is being carried out when an attacker joins TCP season and makes both parties think he or she is the other party?

Session Hijacking

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

Signatures

A computer hacker may use a phishing email to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

Social Engineering

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

Spyware

What type of malicious computer programs present themselves as useful computer programs or applications?

Trojan Programs

A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer.

Trojan.

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an email?

Virus

Malicious program that attaches itself to a file or another program.

Virus.

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

Worm

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

Zombies


Set pelajaran terkait

Chap. 7 Organization, Teamwork, and Communication

View Set

Estate planning Process, Goals, and Property Ownership

View Set

The Art of Public Speaking, Ch. 11-14, 16-19

View Set

Leadership Exam 2: Ch 8- Power and Influence

View Set

CYSE 300- Introduction to Cybersecurity

View Set