A person registers a domain name, relinquishes it in less than five days

A person registers a domain name, relinquishes it in less than five days


The term ___________ refers to software that has been designed for some nefarious purpose.

A. virus

B. worm

C. Trojan horse

D. Malware

 

·         malware

 

Which term refers to a form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality?

A. Rootkit

B. Boot sector virus

C. Spyware

D. Dieware

 

·         Rootkit

 

What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload?

A. Trojan

B. Logic bomb

C. Trigger virus

D. Logic worm

 

·         Logic bomb

 

 

What term refers to an attacker's attempt to discover unprotected modem connections to computer systems and networks?

A. Software exploitation

B. Indirect attack

C. War-dialing

D. Spoofing

 

·         War-dialing

 

The term __________ refers the unauthorized scanning for and connecting to wireless access points, frequently done while driving near a facility.

A. War-driving

B. War-dialing

C. Indirect attack

D. Brute force attack

 

·         War-driving

 

__________ relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to.

A. Social engineering

B. User exploitation

C. War-driving

D. Indirect attack

 

·         Social engineering

 

Making data look like it has come from a different source is called

A. Sniffing

B. A man-in-the-middle attack

C. A replay attack

D. Spoofing

 

·         Spoofing

 

Which attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time?

A. TCP/IP hijacking

B. denial-of-service

C. Man-in-the-middle

D. Replay

 

·         replay

 

The process of attempting to break a cryptographic system is called

A. Spoofing

B. Smurfing

C. Cryptography

D. Cryptanalysis

 

·         Cryptanalysis

 

A(n) ____________________ of an encryption system finds weaknesses in the mechanisms surrounding the cryptography.

A. viral attack

B. worm attack

C. indirect attack

D. password attack

indirect attack

 

A(n) ____________________ of an encryption system finds weaknesses in the mechanisms surrounding the cryptography.

A. viral attack

B. worm attack

C. indirect attack

D. password attack

 

·         indirect attack

 

A person registers a domain name, relinquishes it in less than five days, and then gets the same name again. She repeats this cycle over and over again. What term describes this practice?

A. DNS spoofing

B. DNS jacking

C. DNS pilfering

D. DNS kiting

 

·         DNS kiting

 

Which attack uses a password-cracking program that employs a list of dictionary words to try to guess a password?

A. Dictionary attack

B. Brute-force attack

C. Hybrid attack

D. Lister crack

 

·         Dictionary attack

 

An attacker purposely sends a program more data for input than it was designed to handle. What type of attack does this represent?

A. Syn flood

B. Buffer overflow

C. Incomplete mediation

D. Logic bomb

 

·         Buffer overflow

 

What term refers to the process of assessing the state of an organization's security compared against an established standard?

A. Pen testing

B. Auditing

C. Vulnerability testing

D. Accounting

 

·         Auditing

 

T/F? A computer system is attacked for one of two general reasons: it is specifically targeted by the attacker or it is a target of opportunity.

 

·         True

 

T/F? Vulnerabilities are exploited by attackers to gain access to a system.

 

·         True

 

T/F? Perpetrating some sort of electronic fraud is one reason a specific system might be targeted for attack.

 

·         True

 

T/F? A birthday attack is a type of logic bomb virus that releases its payload on some famous person's birthday, such as Michelangelo.

 

·         False

 

SYN flooding is an example of a __________.

A. viral attack

B. denial-of-service attack

C. logic bomb

D. Trojan horse

 

·         denial-of-service attack

 

 

Answer Detail

Get This Answer

Invite Tutor