Ethical Hacking Chapter 3 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

Keylogger

Hardware devices or software that can be used to capture keystrokes on a computer

Keyloggers

Malicious software introduced into a network to help an attacker accomplish their goals

Malware

Attackers inject themselves between two parties or systems communicating with one another

Man in the middle

An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction

Ping of Death

Virus that locks a target system until a demanded fee is paid

Ransomware

Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

Root kit

A program that usually hides in the OS tools, so it's almost impossible to detect

Rootkit

A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer

Trojan

What type of malicious computer programs present themselves as useful computer programs or applications

Trojan Programs

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

True

Malicious program that attaches itself to a file or another program

Virus

Which type of program can mitigate some risks associated with malware?

antivirus

When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

buffer overflow

Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

macro

What type of virus is used to lock a user's system, or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

ransomware

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

signatures

An attack that prevents legitimate users from accessing network resources

DOS

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

Denial of Service

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

Eavesdropping

Network of robot computers

Botnet

Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

Card access

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Computer Security


Set pelajaran terkait

SKILL 7.4, Identify the effective thesis statements and topic sentences

View Set

second Simulated Test 10/21/2013

View Set

Data Structures and Object Oriented Programming: UML, Object-Orientation And the UML

View Set

Health 5.1.1 Study: Personal Safety

View Set

Pre-AP Chemistry Semester 1 Exam

View Set

Lección 5: El hotel y adjetivos

View Set

Managing and Behavior in Organization Chapter 1 Study Guide

View Set

Биохимия 1 (50 тестов укр )

View Set