Filters
Question type

Study Flashcards

In the well-known ____ attack,an attacker monitors (or sniffs) packets from the network,modifies them,and inserts them back into the network.


A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle

Correct Answer

verifed

verified

DoS attacks cannot be launched against routers.

Correct Answer

verifed

verified

Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.

Correct Answer

verifed

verified

False

Attempting to reverse-calculate a password is called ____________________.

Correct Answer

verifed

verified

With electronic information is stolen,the crime is readily apparent.

Correct Answer

verifed

verified

A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.

Correct Answer

verifed

verified

List at least six general categories of threat.

Correct Answer

verifed

verified

Compromises to intellectual property
Sof...

View Answer

Script ____________________ are hackers of limited skill who use expertly written software to attack a system.

Correct Answer

verifed

verified

There are generally two skill levels among hackers: expert and ____.


A) novice
B) journeyman
C) packet monkey
D) professional

Correct Answer

verifed

verified

Which of the following is an example of a Trojan horse program?


A) Netsky
B) MyDoom
C) Klez
D) Happy99.exe

Correct Answer

verifed

verified

A(n)____________________ is an object,person,or other entity that represents an ongoing danger to an asset.

Correct Answer

verifed

verified

____________________ is a technique used to gain unauthorized access to computers,wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

Correct Answer

verifed

verified

Spoofing

____ is any technology that aids in gathering information about a person or organization without their knowledge.


A) A bot
B) Spyware
C) Trojan
D) Worm

Correct Answer

verifed

verified

The macro virus infects the key operating system files located in a computer's boot sector._________________________

Correct Answer

verifed

verified

False

A(n)____________________ hacks the public telephone network to make free calls or disrupt services.

Correct Answer

verifed

verified

One form of e-mail attack that is also a DoS is called a mail spoof,in which an attacker routes large quantities of e-mail to the target._________________________

Correct Answer

verifed

verified

Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0,the browser will crash.


A) 64
B) 128
C) 256
D) 512

Correct Answer

verifed

verified

When information gatherers employ techniques that cross the threshold of what is legal or ethical,they are conducting industrial ____________________.

Correct Answer

verifed

verified

A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.


A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam

Correct Answer

verifed

verified

"4-1-9" fraud is an example of a ____ attack.


A) social engineering
B) virus
C) worm
D) spam

Correct Answer

verifed

verified

Showing 1 - 20 of 78

Related Exams

Show Answer