Quiz #10

Ace your homework & exams now with Quizwiz!

A DoS attack is a coordinated attempt to deny service by causing a computer to perform an unproductive task.

True

An alteration threat violates information integrity.

True

An attacker will use exploit software when performing vulnerability assessments and intrusive penetration testing

True

In a dictionary attack, an attacker takes each word from a dictionary and encodes it in the same way an operating system encodes a user's password, usually a hash value.

True

Spoofing means refers to a type of attack in which one a person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

True

Which of the following is the definition of netcat?

A network utility program that reads from and writes to network connections.

Which of the following best describes pharming?

An attack that seeks to obtain personal or private financial information through domain spoofing.

A(n) ________ is a method that black-hat hackers use to attempt to compromise logon and password access controls, usually following a specific attack plan, including the use of social engineering to obtain user information. a type of cybercrime carried out by a highly capable and stealthy team of people and directed at a specific target, such as an individual, organization, or political group.

Bruteman-in-the-middle attack-force password attack

All threats are malicious.

False

Asset means refers to a type of fraud in which an attacker attempts to trick the victim into providing private information.

False

Successfully connecting to a computer using a modem makes it impossible to access the rest of the organization's network.

False

Wiretapping A rootkit is an application incorporating known software vulnerabilities, data, and scripted commands to exploit a weakness in a computer system or IP host device.

False

Unacceptable Web-browsing behavior can cause a security breach. In 2011, the United States ranked second globally as a source of network attacks and highest as a source of attacks in North America, even if they originate outside the United States.

True.

Wardialers are becoming more frequently used given the rise of digital telephony and now IP telephony or Voice over IP (VoIP).

false

Prior to VoIP, attackers would use wardialers to ________.

identify analog modem signals to gain access, gain access to PBX phone systems to commit toll fraud, identify the operating system running on a computer

A(n) ___________ fingerprint scanner is a software program that allows an attacker to send logon packets to an IP host device.

operating system (OS)

A protocol analyzer or ____________ is a software program or hardware device that enables a computer to monitor and capture network traffic.

packet sniffer

A ___________ is a software program that performs one of two functions: a brute-force password attack to gain unauthorized access to a system, or recovery of passwords stored in a computer system.

password cracker


Related study sets

MasteringAandP: Chapter 03 Homework

View Set

Management SkillsMidterm Study Guide

View Set

Honors Bio II Test Review: Chapters 4 & 5

View Set

018 - Chapter 18 - Praxis 5039 (Chapter Test)

View Set

The Great Gatsby Film Analysis Part2: Chapters 7-9 and the Valley of Ashes (representation, what it is, and symbolism)

View Set

Government and Economics (Intro to economics)

View Set

Chapter 13 - The Executive Branch

View Set

Planned and Perceived Obsolescence

View Set

ADN 120 Unit 1 Thermoregulation, Fluid & Electrolytes and Glucose Regulation

View Set

Doctrines Midterm Quiz questions

View Set