Unit2 Quiz
With respect to phishing, a good fictitious email gets a _________ response rate, according to the Federal Bureau of Investigation(FBI)
1-3%
What is meant by distributed denial of service (DDoS) attack?
An attack in which the attacker seeks to infect several machines, and use those machines to overwhelm the target system to achieve a denial of service.
A SYN flood is software that self-replicates.
False
What is meant by three-way handshake?
The process of connecting to a server that involves three packets being exchanged
A logic bomb is malware that is designed to do harm to the system when some logical condition is reached.
True
Denial of service (DoS) attack means an attack designed to overwhelm the target system so it can no longer reply to legitimate requests for connection.
True
The Tribal Flood Network(TFN) is one of the most widely deployed viruses.
True
Viruses are remarkably easy to locate, but difficult to trace back to the creator
True
Which of the following is the definition of fraud?
any attempt to gain financial reward through deception.
The use of electronic communications to harass or threaten another person is the definition of __________
cyberstalking
What term is used to describe an attack designed to overwhelm, the target system so it can no longer reply to legitimate requests for connection?
denial of service(D0S) attack
The term three-way handshake describes the use of electronic communications to harass or threaten another person
false
Most often, criminals commit_________ in order to perpetrate some financial fraud.
identity theft
If the crime being investigated is identify theft, then the first thing the investigator should be looking for is_________________.
spyware on the victim's machine.