Quiz 3

Ace your homework & exams now with Quizwiz!

Social Engineering attacks can be automated.

True

This type of analysis is done by running the program to see what it does and to observe its behavior.

Dynamic Analysis

This is the process of acquiring network traffic that is addressed to systems other than your own.

Packet Capturing

This can be part of a payload of virus or worm. It can also be installed by another type of malware and has C&C functionality.

Botnet

This Social Engineering Vector is based on the idea of baiting someone for information. This is a technique used to acquire information through deception using electronic communications such as email.

Phising

This malware type has the ability to identify a program to infect and also copy itself into that program. It is said to have the same phases as its biological counterpart.

Virus

This is the most effective way to see what a program is going to do, short of running it. Essentially it allows you to look at the source code.

Disassembly

This type of attack has been around probably as long as humans themselves. It is the art of manipulating someone into doing something via influence.

Social Engineering

This is a GUI-based packet capture program that is quite popular, and intuitive and does come with command line enhancements. It also gives the user the ability to easily scroll through the list of all frames captured.

Wireshark


Related study sets

Table 6-2 and Table 6-3: Muscle of Mastication and Neck

View Set

MRU2.4: Another Look at Comparative Advantage

View Set

Lewis Chapter 58 Chronic Neurologic Problems Questions, LEWIS: Chapter 61: Peripheral Nerve and Spinal Cord Problems, Lewis Ch 59 - Dementia and Delirium, Chapter 55 (Lewis): Nervous System

View Set

Types of Reliability and Validity

View Set

Chapter 8- Real Estate sales contract

View Set