A person registers a domain name, relinquishes it in less than five days
The term ___________
refers to software that has been designed for some nefarious purpose.
A. virus
B. worm
C. Trojan horse
D. Malware
·
malware
Which term refers to a
form of malware that is specifically designed to modify the operation of the operating
system in some fashion to facilitate nonstandard functionality?
A. Rootkit
B. Boot sector virus
C. Spyware
D. Dieware
·
Rootkit
What term refers to a
piece of code that sits dormant for a period of time until some event invokes
its malicious payload?
A. Trojan
B. Logic bomb
C. Trigger virus
D. Logic worm
·
Logic bomb
What term refers to an
attacker's attempt to discover unprotected modem connections to computer
systems and networks?
A. Software exploitation
B. Indirect attack
C. War-dialing
D. Spoofing
·
War-dialing
The term __________
refers the unauthorized scanning for and connecting to wireless access points,
frequently done while driving near a facility.
A. War-driving
B. War-dialing
C. Indirect attack
D. Brute force attack
·
War-driving
__________ relies on
lies and misrepresentation, which an attacker uses to trick an authorized user
into providing information or access the attacker would not normally be
entitled to.
A. Social engineering
B. User exploitation
C. War-driving
D. Indirect attack
·
Social engineering
Making data look like
it has come from a different source is called
A. Sniffing
B. A man-in-the-middle attack
C. A replay attack
D. Spoofing
·
Spoofing
Which attack occurs
when the attacker captures a portion of a communication between two parties and
retransmits it at a later time?
A. TCP/IP hijacking
B. denial-of-service
C. Man-in-the-middle
D. Replay
·
replay
The process of
attempting to break a cryptographic system is called
A. Spoofing
B. Smurfing
C. Cryptography
D. Cryptanalysis
·
Cryptanalysis
A(n)
____________________ of an encryption system finds weaknesses in the mechanisms
surrounding the cryptography.
A. viral attack
B. worm attack
C. indirect attack
D. password attack
indirect attack
A(n)
____________________ of an encryption system finds weaknesses in the mechanisms
surrounding the cryptography.
A. viral attack
B. worm attack
C. indirect attack
D. password attack
·
indirect attack
A person registers a
domain name, relinquishes it in less than five days, and then gets the same
name again. She repeats this cycle over and over again. What term describes
this practice?
A. DNS spoofing
B. DNS jacking
C. DNS pilfering
D. DNS kiting
·
DNS kiting
Which attack uses a
password-cracking program that employs a list of dictionary words to try to
guess a password?
A. Dictionary attack
B. Brute-force attack
C. Hybrid attack
D. Lister crack
·
Dictionary attack
An attacker purposely
sends a program more data for input than it was designed to handle. What type
of attack does this represent?
A. Syn flood
B. Buffer overflow
C. Incomplete mediation
D. Logic bomb
·
Buffer overflow
What term refers to
the process of assessing the state of an organization's security compared against
an established standard?
A. Pen testing
B. Auditing
C. Vulnerability testing
D. Accounting
·
Auditing
T/F? A computer system
is attacked for one of two general reasons: it is specifically targeted by the
attacker or it is a target of opportunity.
·
True
T/F? Vulnerabilities
are exploited by attackers to gain access to a system.
·
True
T/F? Perpetrating some
sort of electronic fraud is one reason a specific system might be targeted for
attack.
·
True
T/F? A birthday attack
is a type of logic bomb virus that releases its payload on some famous person's
birthday, such as Michelangelo.
·
False
SYN flooding is an
example of a __________.
A. viral attack
B. denial-of-service attack
C. logic bomb
D. Trojan horse
·
denial-of-service
attack