Deck 3: Network and Computer Attacks

ملء الشاشة (f)
exit full mode
سؤال
In a buffer overflow attack,an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

A) buffer overflow
B) DoS
C) DDoS
D) session hijacking
سؤال
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A) virus
B) Trojan
C) worm
D) shell
سؤال
Malware is malicious software,such as a virus,worm,or Trojan program,introduced into a network.
سؤال
Malware programs cannot be detected by antivirus programs.
سؤال
The acronym IDS stands for which of the following?

A) Intrusion Detection System
B) Information Dissemination System
C) Information Destruction System
D) Intruder Dispersal System
سؤال
Which type of program can mitigate some risks associated with malware?

A) shells
B) bots
C) antivirus
D) rootkits
سؤال
What type of malicious computer programs present themselves as useful computer programs or applications?

A) macro viruses
B) worms
C) Spyware programs
D) Trojan programs
سؤال
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A) shell
B) virus
C) keylogger
D) rootkit
سؤال
What type of virus is used to lock a user's system,or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

A) keylogger
B) rootkit
C) ransomware
D) macro
سؤال
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later.What means of access is the attacker utilizing?

A) backdoor
B) shell
C) worm
D) macro virus
سؤال
Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

A) macro
B) rootkit
C) keylogger
D) adware
سؤال
Which of the following sometimes displays a banner that notifies the user of its presence?

A) Spyware
B) Adware
C) Webware
D) Malware
سؤال
A DDoS attack is launched against a host from a single server or workstation.
سؤال
Whitelisting allows only approved programs to run on a computer.
سؤال
The virus signature file is maintained by what type of software?

A) antivirus
B) keylogger
C) remote control
D) firewall
سؤال
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

A) Host security
B) Server security
C) Computer security
D) Network security
سؤال
Which of the following is created after an attack and usually hides within the OS tools,so it is almost impossible to detect?

A) toolbox
B) rootkit
C) shell
D) macro virus
سؤال
If an attacker wishes to collect confidential financial data,passwords,PINs and any personal data stored on your computer which of the following programs would they choose to use?

A) Adware
B) Spybot
C) Malware
D) Spyware
سؤال
Which type of attack cripples the network and prevents legitimate users from accessing network resources?

A) buffer overflow
B) session hijacking
C) social engineering
D) denial-of-service
سؤال
Describe the basic function and creation process of a macro virus.
سؤال
What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

A) Man-in-the-Middle
B) Ping of Death
C) Middle-Capture
D) DDOS
سؤال
Explain how the two different types of keyloggers are used?
سؤال
How does a buffer overflow attack work?
سؤال
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A) signatures
B) heuristics
C) macros
D) bots
سؤال
What is a DDoS attack?
سؤال
Explain how a basic computer virus operates and how it uses other host programs.
سؤال
What is spyware and how does it operate?
سؤال
A computer hacker may use a phishing e-mail to lure a user into following a malicious link.What type of technique is being used by the computer hacker?

A) mail fraud
B) heuristics
C) ransoming
D) social engineering
سؤال
What types of ports do successful Trojan programs commonly use?
سؤال
Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

A) rotary locks
B) combination locks
C) card access
D) deadbolt locks
سؤال
What type of attack causes the victim's computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

A) MTU ping
B) Ping of Death
C) buffer overflow
D) session hijacking
سؤال
When a computer hacker uses multiple compromised computers to carry out a DDOS attack,the compromised computers are usually referred to as which of the following?

A) viruses
B) zombies
C) macros
D) cyborgs
سؤال
What is the difference between spyware and adware?
سؤال
Explain the advantages of application whitelisting?
سؤال
Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

A) signatures
B) heuristics
C) macros
D) bots
سؤال
How do Trojan programs operate?
سؤال
Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

A) A DoS attack
B) Ping of Death
C) A buffer overflow attack
D) Session hijacking
سؤال
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

A) eavesdropping
B) overflowing
C) injecting
D) capturing
سؤال
What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

A) Viruses
B) Keyloggers
C) Macro viruses
D) Shells
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that usually hides in the OS tools,so it's almost impossible to detect
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Hardware devices or software that can be used to capture keystrokes on a computer
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious software introduced into a network to help an attacker accomplish their goals
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious program that attaches itself to a file or another program
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Network of robot computers
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that prevents legitimate users from accessing network resources
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Attackers inject themselves between two parties or systems communicating with one another
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Virus that locks a target system until a demanded fee is paid
سؤال
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Network and Computer Attacks
1
In a buffer overflow attack,an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.
True
2
When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

A) buffer overflow
B) DoS
C) DDoS
D) session hijacking
A
3
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A) virus
B) Trojan
C) worm
D) shell
C
4
Malware is malicious software,such as a virus,worm,or Trojan program,introduced into a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Malware programs cannot be detected by antivirus programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The acronym IDS stands for which of the following?

A) Intrusion Detection System
B) Information Dissemination System
C) Information Destruction System
D) Intruder Dispersal System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which type of program can mitigate some risks associated with malware?

A) shells
B) bots
C) antivirus
D) rootkits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
What type of malicious computer programs present themselves as useful computer programs or applications?

A) macro viruses
B) worms
C) Spyware programs
D) Trojan programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A) shell
B) virus
C) keylogger
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What type of virus is used to lock a user's system,or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

A) keylogger
B) rootkit
C) ransomware
D) macro
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later.What means of access is the attacker utilizing?

A) backdoor
B) shell
C) worm
D) macro virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

A) macro
B) rootkit
C) keylogger
D) adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following sometimes displays a banner that notifies the user of its presence?

A) Spyware
B) Adware
C) Webware
D) Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A DDoS attack is launched against a host from a single server or workstation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Whitelisting allows only approved programs to run on a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
The virus signature file is maintained by what type of software?

A) antivirus
B) keylogger
C) remote control
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

A) Host security
B) Server security
C) Computer security
D) Network security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is created after an attack and usually hides within the OS tools,so it is almost impossible to detect?

A) toolbox
B) rootkit
C) shell
D) macro virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
If an attacker wishes to collect confidential financial data,passwords,PINs and any personal data stored on your computer which of the following programs would they choose to use?

A) Adware
B) Spybot
C) Malware
D) Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which type of attack cripples the network and prevents legitimate users from accessing network resources?

A) buffer overflow
B) session hijacking
C) social engineering
D) denial-of-service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Describe the basic function and creation process of a macro virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

A) Man-in-the-Middle
B) Ping of Death
C) Middle-Capture
D) DDOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Explain how the two different types of keyloggers are used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
How does a buffer overflow attack work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A) signatures
B) heuristics
C) macros
D) bots
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
What is a DDoS attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Explain how a basic computer virus operates and how it uses other host programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is spyware and how does it operate?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
A computer hacker may use a phishing e-mail to lure a user into following a malicious link.What type of technique is being used by the computer hacker?

A) mail fraud
B) heuristics
C) ransoming
D) social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What types of ports do successful Trojan programs commonly use?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

A) rotary locks
B) combination locks
C) card access
D) deadbolt locks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What type of attack causes the victim's computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

A) MTU ping
B) Ping of Death
C) buffer overflow
D) session hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
When a computer hacker uses multiple compromised computers to carry out a DDOS attack,the compromised computers are usually referred to as which of the following?

A) viruses
B) zombies
C) macros
D) cyborgs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
What is the difference between spyware and adware?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Explain the advantages of application whitelisting?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

A) signatures
B) heuristics
C) macros
D) bots
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
How do Trojan programs operate?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

A) A DoS attack
B) Ping of Death
C) A buffer overflow attack
D) Session hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

A) eavesdropping
B) overflowing
C) injecting
D) capturing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

A) Viruses
B) Keyloggers
C) Macro viruses
D) Shells
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that usually hides in the OS tools,so it's almost impossible to detect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Hardware devices or software that can be used to capture keystrokes on a computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious software introduced into a network to help an attacker accomplish their goals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious program that attaches itself to a file or another program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Network of robot computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that prevents legitimate users from accessing network resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Attackers inject themselves between two parties or systems communicating with one another
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Virus that locks a target system until a demanded fee is paid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.