Filters
Question type

Study Flashcards

In a ____ attack, a programmer finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.


A) buffer overflow
B) DoS
C) DDoS
D) session hijacking

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

____ sometimes displays a banner that notifies the user of its presence.


A) Spyware
B) Adware
C) Webware
D) Malware

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -common Trojan program


A) shell
B) W32/Sobig.F
C) Luckysploit
D) Ping of Death
E) KeyGhost
F) Melissa
G) Back Orifice
H) Slammer
I) Mytob

J) A) and H)
K) A) and C)

Correct Answer

verifed

verified

What is a DDoS attack?

Correct Answer

verifed

verified

A distributed denial-of-service (DDoS)at...

View Answer

In the ____ attack, the attacker simply creates an ICMP packet that's larger than the maximum allowed 65,535 bytes.


A) DoS
B) Ping of Death
C) buffer overflow
D) session hijacking

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A(n) ____________________ is a virus encoded as a macro in programs that support a macro programming language, such as Visual Basic for Applications (VBA).

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -hardware keylogger


A) shell
B) W32/Sobig.F
C) Luckysploit
D) Ping of Death
E) KeyGhost
F) Melissa
G) Back Orifice
H) Slammer
I) Mytob

J) F) and H)
K) E) and H)

Correct Answer

verifed

verified

____ enables an attacker to join a TCP session and make both parties think he or she is the other party.


A) A DoS attack
B) The Ping of Death
C) A buffer overflow attack
D) Session hijacking

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -attack side of a sophisticated cybercrime toolkit that spreads when Web surfers visit a hacked Web site hosting the malware


A) shell
B) W32/Sobig.F
C) Luckysploit
D) Ping of Death
E) KeyGhost
F) Melissa
G) Back Orifice
H) Slammer
I) Mytob

J) A) and B)
K) A) and H)

Correct Answer

verifed

verified

____ commands that open and close files can be used in destructive ways.


A) Macro
B) Firewall
C) Keylogger
D) Adware

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Trojan Programs can install a backdoor or ____ on a computer.


A) rootkit
B) shell
C) worm
D) macro virus

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

MATCHING Match each term with the correct statement below. -most infamous macro virus


A) shell
B) W32/Sobig.F
C) Luckysploit
D) Ping of Death
E) KeyGhost
F) Melissa
G) Back Orifice
H) Slammer
I) Mytob

J) A) and B)
K) B) and I)

Correct Answer

verifed

verified

To represent 0 to 63 characters you need only ____ bits.


A) four
B) five
C) six
D) seven

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.


A) toolbox
B) rootkit
C) shell
D) macro virus

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

____ is a remote control program.


A) Slammer
B) BlackIce
C) Symantec pcAnywhere
D) Zone Alarm

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.


A) macro viruses
B) worms
C) spyware programs
D) Trojan programs

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

____________________ is malicious software, such as a virus,worm, or Trojan program, introduced to a network for just that reason.

Correct Answer

verifed

verified

What is the most important recommendation that should be made to a client to help prevent viruses from being introduced into corporate networks?

Correct Answer

verifed

verified

To help prevent viruses from being intro...

View Answer

A ____ can replicate itself, usually through an executable program attached to an e-mail.


A) shell
B) virus
C) keylogger
D) rootkit

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following provides the most secure method of securing a company's assets?


A) rotary locks
B) combination locks
C) card access
D) deadbolt locks

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer