Quizzes
triggering
"Computer virus typically goes through four phases that include dormant, _________, execution and termination phases"
online shop
"On DRM, a distributor can provide distribution channel like _____________"
Mobile Code
"Popular vehicles for _______ include Java appletes, Active X, JavaScript and VB script"
Wireless access point
"The components of wireless environment that provide point of attack: the wireless client, the transmission medium, and the ____________"
Crimeware
"______ are toolkits that include malware propagation and payload mechanisms that users can combine, select and deploy"
Macro virus
"_______ exploits the support for active content using a scripting language, embedded in an office document"
TLS
An example of network security schemes that uses digital signatures is
Shifted cipher
Caesar
Mobile
Code that is run on a device after getting transmitted from another over a network is called _______ code
Breaking of code
Cryptanalysis
Block cipher
DES
messages
Data integrity algorithms protect ________ from alteration
Key logger
Investigation on a sluggish PC as reported by the user reveals High CPU usage. The malware involved most likely could be _____
12
MITRE ATT&CK framework covers ________ adversary tactics
Sandbox
One method malware analysis involves running potentially malicious code in an emulated _________
egress
Perimeter monitoring includes ingress monitoring and ___________ monitoring
Stream cipher
RC4
HTTPS
SSL
Social Engineering
Someone calling the help desk and persuades them to reset a password for them for hacking is a ____________ attack
Frequency analysis
Substitution Cipher (Usable for any language) has a major weakness that could be exploited by__________
Cryptology
The field of cryptography and cryptanalysis together is known as
patent
The grant of property right to the inventor is known as __________
DoS
The wireless environment lends itself to a ______ attack as it is easy for the attacker to direct multiple wireless messages at the target.
Key Reinstallation
WPA2 is open to ________ attack
Access point
Wireless security threats include the following except ____________
Signal-hiding techniques
_________ is a countermeasure for WiFi eavesdropping
Polymorphic
_________ virus can produce variation of it's own copies and can hide from a scanner
Kerberos
__________ is a centralized network authentication that is the default authentication method in Windows 2000 and later.
virus
__________ needs for propagation as it is not a self contained independent program
memory resident
__________ program is used by 3rd gen Antivirus for malware identification by action than its structure
worm
____________ can copy itself from a system to a remote system after logging into the remote system
Trojan Horse
____________ program contains hidden code that is malicious
PaaS
_________________ enables the customer to deploy onto the cloud infrastructure customer-created applications
Symmetric
single key encryption