What is the process of assessing the state of an organization's security

What is the process of assessing the state of an organization's security


SYN flooding is an example of a
- Viral attack
- Denial of service attack
- Logic bomb
- Trojan horse

 

·         Denial of service attack

 

A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.
- logic bomb
- network sniffer
- backdoor
- trapdoor

 

·         network sniffer

 

Making data look like it has come from a different source is called
- Sniffing
- A man-in-the-middle attack
- A replay attack
- Spoofing

 

·         Spoofing

 

 

In a ___________ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network.
- smurf
- denial-of-service
- viral
- worm

 

·         smurf

 

An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a(n) ___________ attack.
- smurf
- denial-of-service
- viral
- replay

 

·         replay

 

A term used to refer to the process of taking control of an already existing session between a client and a server is
- TCP/IP hijacking
- Replay attacking
- Denial-of-service attack
- Password guessing

 

·         TCP/IP hijacking

 

The art of "secret writing" is called
- Spoofing
- Smurfing
- Cryptography
- Cryptanalysis

 

·         Cryptography

 

A(n) ___________ finds weaknesses in the mechanisms surrounding the cryptography.
- viral attack
- worm attack
- indirect attack
- password attack

 

·         indirect attack

 

An attack that takes advantage of bugs or weaknesses in the software is referred to as what?
- A brute-force attack
- Software exploitation
- A dictionary attack
- Weakness exploitation

 

·         Software exploitation

 

What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?
- Software exploitation
- Indirect attack
- War-dialing
- Spoofing

 

·         War-dialing

 

The activity where hackers wander throughout an area with a computer with wireless capability, searching for wireless networks they can access is referred to as which of the following?
- War-driving
- War-dialing
- Indirect attack
- Brute force attack

 

·         War-driving

 

_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.
- Social engineering
- User exploitation
- War-driving
- Indirect attack

 

·         Social engineering

 

In a ______________, a password cracking program attempts all possible password combinations.
- brute-force attack
- dictionary attack
- man-in-the-middle attack
- replay attack

 

·         brute-force attack

 

The term ___________ refers to software that has been designed for some nefarious purpose.
- virus
- worm
- Trojan horse
- malware

 

·         malware

 

What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers?
- Spoofing
- Man-in-the-middle attack
- Sniffing
- Injecting

 

·         Man-in-the-middle attack

 

What is the automated downloading of malware that takes advantage of a browsers' ability to the download different files that compose a web page called?
- Download of death
- Trojanized download
- Drive-by download
- War-downloading

 

·         Drive-by download

 

What is the process of assessing the state of an organization's security compared against an established standard called?
- Pen testing
- Auditing
- Vulnerability testing
- Accounting

 

·         Auditing

 

Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor grammar and incorrect spelling. He calls up his bank to ask if they sent the e-mail, and they promptly tell him they did not and would not ask for that kind of information. What is this type of attack called?
- Phishing
- Pharming
- Spear pharming
- Spishing

 

·         Phishing

 

What is it called when a person registers a domain name, relinquishes it in less than five days, and then gets the same name again, repeating this cycle over and over again?
- DNS spoofing
- DNS jacking
- DNS pilfering
- DNS kiting

 

·         DNS kiting

 

What is the term for when a large list of words are used to try and crack a password?
- Dictionary attack
- Brute-force attack
- Hybrid attack
- Lister crack

 

·         Dictionary attack

 

When an attacker purposely sends more data for input that the program was designed to handle and it results in a system crash, what is this an example of?
- Syn flood
- Buffer overflow
- Incomplete mediation
- Logic bomb

 

·         Buffer overflow

 

Johnny received a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor was installed on his computer without his knowledge. What kind of an attack is this?
- Logic bomb
- Hoax
- Trojan
- Worm

 

·         Trojan

 

What is software that records and reports activities of the user (typically without their knowledge) called?
- Snoopware
- Malware
- Spyware
- Eyeware

 

·         Spyware

 

Malicious code that sits dormant until a particular event occurs to release its payload is called what?
- Trojan
- Logic bomb
- Trigger virus
- Logic worm

 

·         Logic bomb

 

What is the term for malware that changes the way the operating system functions to avoid detection?
- Rootkit
- Boot sector virus
- Spyware
- Dieware

 

·         Rootkit

 

Answer Detail

Get This Answer

Invite Tutor