Quizzes

Ace your homework & exams now with Quizwiz!

triggering

"Computer virus typically goes through four phases that include dormant, _________, execution and termination phases"

online shop

"On DRM, a distributor can provide distribution channel like _____________"

Mobile Code

"Popular vehicles for _______ include Java appletes, Active X, JavaScript and VB script"

Wireless access point

"The components of wireless environment that provide point of attack: the wireless client, the transmission medium, and the ____________"

Crimeware

"______ are toolkits that include malware propagation and payload mechanisms that users can combine, select and deploy"

Macro virus

"_______ exploits the support for active content using a scripting language, embedded in an office document"

TLS

An example of network security schemes that uses digital signatures is

Shifted cipher

Caesar

Mobile

Code that is run on a device after getting transmitted from another over a network is called _______ code

Breaking of code

Cryptanalysis

Block cipher

DES

messages

Data integrity algorithms protect ________ from alteration

Key logger

Investigation on a sluggish PC as reported by the user reveals High CPU usage. The malware involved most likely could be _____

12

MITRE ATT&CK framework covers ________ adversary tactics

Sandbox

One method malware analysis involves running potentially malicious code in an emulated _________

egress

Perimeter monitoring includes ingress monitoring and ___________ monitoring

Stream cipher

RC4

HTTPS

SSL

Social Engineering

Someone calling the help desk and persuades them to reset a password for them for hacking is a ____________ attack

Frequency analysis

Substitution Cipher (Usable for any language) has a major weakness that could be exploited by__________

Cryptology

The field of cryptography and cryptanalysis together is known as

patent

The grant of property right to the inventor is known as __________

DoS

The wireless environment lends itself to a ______ attack as it is easy for the attacker to direct multiple wireless messages at the target.

Key Reinstallation

WPA2 is open to ________ attack

Access point

Wireless security threats include the following except ____________

Signal-hiding techniques

_________ is a countermeasure for WiFi eavesdropping

Polymorphic

_________ virus can produce variation of it's own copies and can hide from a scanner

Kerberos

__________ is a centralized network authentication that is the default authentication method in Windows 2000 and later.

virus

__________ needs for propagation as it is not a self contained independent program

memory resident

__________ program is used by 3rd gen Antivirus for malware identification by action than its structure

worm

____________ can copy itself from a system to a remote system after logging into the remote system

Trojan Horse

____________ program contains hidden code that is malicious

PaaS

_________________ enables the customer to deploy onto the cloud infrastructure customer-created applications

Symmetric

single key encryption


Related study sets

Chapter 6: GA Rules and Codes Pertinent to Life Insurance Only

View Set

Chapter 4: Maintaining a Safe Environment

View Set

BISC321 - Exam 1 reading questions

View Set