Deck 15: Types of Attacks and Malicious Software

ملء الشاشة (f)
exit full mode
سؤال
What is the term for when a large list of words are used to try and crack a password?

A)Dictionary attack
B)Brute-force attack
C)Hybrid attack
D)Lister crack
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An attack that takes advantage of bugs or weaknesses in the software is referred to as what?

A)A brute-force attack
B)Software exploitation
C)A dictionary attack
D)Weakness exploitation
سؤال
In a ___________ attack,the attacker sends a spoofed packet to the broadcast address for a network,which distributes the packet to all systems on that network.

A)smurf
B)denial-of-service
C)viral
D)worm
سؤال
Making data look like it has come from a different source is called

A)Sniffing
B)A man-in-the-middle attack
C)A replay attack
D)Spoofing
سؤال
What is it called when a person registers a domain name,relinquishes it in less than five days,and then gets the same name again,repeating this cycle over and over again?

A)DNS spoofing
B)DNS jacking
C)DNS pilfering
D)DNS kiting
سؤال
SYN flooding is an example of a

A)Viral attack
B)Denial of service attack
C)Logic bomb
D)Trojan horse
سؤال
What is it called when an attacker makes his data look like it is coming from a different source address,and is able to intercept information transferred between two computers?

A)Spoofing
B)Man-in-the-middle attack
C)Sniffing
D)Injecting
سؤال
A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.

A)logic bomb
B)network sniffer
C)backdoor
D)trapdoor
سؤال
A(n)___________ finds weaknesses in the mechanisms surrounding the cryptography.

A)viral attack
B)worm attack
C)indirect attack
D)password attack
سؤال
A term used to refer to the process of taking control of an already existing session between a client and a server is

A)TCP/IP hijacking
B)Replay attacking
C)Denial-of-service attack
D)Password guessing
سؤال
The term ___________ refers to software that has been designed for some nefarious purpose.

A)virus
B)worm
C)Trojan horse
D)malware
سؤال
What is the automated downloading of malware that takes advantage of a browsers' ability to the download different files that compose a web page called?

A)Download of death
B)Trojanized download
C)Drive-by download
D)War-downloading
سؤال
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?

A)Software exploitation
B)Indirect attack
C)War-dialing
D)Spoofing
سؤال
The art of "secret writing" is called

A)Spoofing
B)Smurfing
C)Cryptography
D)Cryptanalysis
سؤال
What is the process of assessing the state of an organization's security compared against an established standard called?

A)Pen testing
B)Auditing
C)Vulnerability testing
D)Accounting
سؤال
Bob gets an e-mail addressed from his bank,asking for his user ID and password.He then notices that the e-mail has poor grammar and incorrect spelling.He calls up his bank to ask if they sent the e-mail,and they promptly tell him they did not and would not ask for that kind of information.What is this type of attack called?

A)Phishing
B)Pharming
C)Spear pharming
D)Spishing
سؤال
In a ______________,a password cracking program attempts all possible password combinations.

A)brute-force attack
B)dictionary attack
C)man-in-the-middle attack
D)replay attack
سؤال
The activity where hackers wander throughout an area with a computer with wireless capability,searching for wireless networks they can access is referred to as which of the following?

A)War-driving
B)War-dialing
C)Indirect attack
D)Brute force attack
سؤال
An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a(n)___________ attack.

A)smurf
B)denial-of-service
C)viral
D)replay
سؤال
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

A)Social engineering
B)User exploitation
C)War-driving
D)Indirect attack
سؤال
The term _______________ is used to refer to programs that attackers install after gaining unauthorized access to a system,ensuring that they can continue to have unrestricted access to the system,even if their initial access method is discovered and blocked.
سؤال
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
سؤال
Malicious code that sits dormant until a particular event occurs to release its payload is called what?

A)Trojan
B)Logic bomb
C)Trigger virus
D)Logic worm
سؤال
An attacker will do reconnaissance by going to public sites like SEC.gov and whois.net to get important information that can be used in an attack.
سؤال
_______________ is a situation where someone examines all the network traffic that passes their NIC,whether addressed for them or not.
سؤال
Attacks on computer systems can be grouped into two broad categories: attacks on specific software,and attacks on a specific protocol or service.
سؤال
The ping of death is a type of distributed denial of service.
سؤال
A birthday attack is a type of logic bomb virus that releases its payload on some famous person's birthday,such as Michelangelo.
سؤال
Defense begins by eliminating threats.
سؤال
A syn flood is type of spam that floods the inbox with pornographic material.
سؤال
A(n)_______________ attack is an attack designed to prevent a system or service from functioning normally.
سؤال
When an attacker purposely sends more data for input that the program was designed to handle and it results in a system crash,what is this an example of?

A)Syn flood
B)Buffer overflow
C)Incomplete mediation
D)Logic bomb
سؤال
What is the term for malware that changes the way the operating system functions to avoid detection?

A)Rootkit
B)Boot sector virus
C)Spyware
D)Dieware
سؤال
Johnny received a "new version" of the game Solitaire in an e-mail.After running the program,a backdoor was installed on his computer without his knowledge.What kind of an attack is this?

A)Logic bomb
B)Hoax
C)Trojan
D)Worm
سؤال
A(n)_______________ is a connection to a Windows interprocess communications share (IPC$).
سؤال
What is software that records and reports activities of the user (typically without their knowledge)called?

A)Snoopware
B)Malware
C)Spyware
D)Eyeware
سؤال
A computer system is attacked for one of two reasons: it is specifically targeted by the attacker,or it is a target of opportunity.
سؤال
The last step in minimizing possible avenues of attack is updating system patches.
سؤال
A(n)_______________ is a 32-bit number established by the host that is incremented for each packet sent.
سؤال
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.
سؤال
TCP/IP hijacking and _______________ are terms used to refer to the process of taking control of an already existing session between a client and a server.
سؤال
What should be included in a security audit?
سؤال
How can social engineering be used to gain access to a computer network and what is the best way to prevent it from happening?
سؤال
A(n)_______________ occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time.
سؤال
_______________ is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users.
سؤال
List and describe the steps a hacker takes to attack a network.
سؤال
Describe some of the types of attacks that can be launched against a network.
سؤال
List and describe various types of malware.
سؤال
_______________ is an economic attack against the terms of using a new DNS entry.
سؤال
A _______________ occurs when a program is provided more data for input than it was designed to handle.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Types of Attacks and Malicious Software
1
What is the term for when a large list of words are used to try and crack a password?

A)Dictionary attack
B)Brute-force attack
C)Hybrid attack
D)Lister crack
A
2
An attack that takes advantage of bugs or weaknesses in the software is referred to as what?

A)A brute-force attack
B)Software exploitation
C)A dictionary attack
D)Weakness exploitation
B
3
In a ___________ attack,the attacker sends a spoofed packet to the broadcast address for a network,which distributes the packet to all systems on that network.

A)smurf
B)denial-of-service
C)viral
D)worm
A
4
Making data look like it has come from a different source is called

A)Sniffing
B)A man-in-the-middle attack
C)A replay attack
D)Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is it called when a person registers a domain name,relinquishes it in less than five days,and then gets the same name again,repeating this cycle over and over again?

A)DNS spoofing
B)DNS jacking
C)DNS pilfering
D)DNS kiting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
SYN flooding is an example of a

A)Viral attack
B)Denial of service attack
C)Logic bomb
D)Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is it called when an attacker makes his data look like it is coming from a different source address,and is able to intercept information transferred between two computers?

A)Spoofing
B)Man-in-the-middle attack
C)Sniffing
D)Injecting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.

A)logic bomb
B)network sniffer
C)backdoor
D)trapdoor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
A(n)___________ finds weaknesses in the mechanisms surrounding the cryptography.

A)viral attack
B)worm attack
C)indirect attack
D)password attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
A term used to refer to the process of taking control of an already existing session between a client and a server is

A)TCP/IP hijacking
B)Replay attacking
C)Denial-of-service attack
D)Password guessing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
The term ___________ refers to software that has been designed for some nefarious purpose.

A)virus
B)worm
C)Trojan horse
D)malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is the automated downloading of malware that takes advantage of a browsers' ability to the download different files that compose a web page called?

A)Download of death
B)Trojanized download
C)Drive-by download
D)War-downloading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?

A)Software exploitation
B)Indirect attack
C)War-dialing
D)Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
The art of "secret writing" is called

A)Spoofing
B)Smurfing
C)Cryptography
D)Cryptanalysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is the process of assessing the state of an organization's security compared against an established standard called?

A)Pen testing
B)Auditing
C)Vulnerability testing
D)Accounting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Bob gets an e-mail addressed from his bank,asking for his user ID and password.He then notices that the e-mail has poor grammar and incorrect spelling.He calls up his bank to ask if they sent the e-mail,and they promptly tell him they did not and would not ask for that kind of information.What is this type of attack called?

A)Phishing
B)Pharming
C)Spear pharming
D)Spishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
In a ______________,a password cracking program attempts all possible password combinations.

A)brute-force attack
B)dictionary attack
C)man-in-the-middle attack
D)replay attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The activity where hackers wander throughout an area with a computer with wireless capability,searching for wireless networks they can access is referred to as which of the following?

A)War-driving
B)War-dialing
C)Indirect attack
D)Brute force attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a(n)___________ attack.

A)smurf
B)denial-of-service
C)viral
D)replay
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

A)Social engineering
B)User exploitation
C)War-driving
D)Indirect attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
The term _______________ is used to refer to programs that attackers install after gaining unauthorized access to a system,ensuring that they can continue to have unrestricted access to the system,even if their initial access method is discovered and blocked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Malicious code that sits dormant until a particular event occurs to release its payload is called what?

A)Trojan
B)Logic bomb
C)Trigger virus
D)Logic worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
An attacker will do reconnaissance by going to public sites like SEC.gov and whois.net to get important information that can be used in an attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
_______________ is a situation where someone examines all the network traffic that passes their NIC,whether addressed for them or not.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Attacks on computer systems can be grouped into two broad categories: attacks on specific software,and attacks on a specific protocol or service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
The ping of death is a type of distributed denial of service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
A birthday attack is a type of logic bomb virus that releases its payload on some famous person's birthday,such as Michelangelo.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Defense begins by eliminating threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
A syn flood is type of spam that floods the inbox with pornographic material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
A(n)_______________ attack is an attack designed to prevent a system or service from functioning normally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
When an attacker purposely sends more data for input that the program was designed to handle and it results in a system crash,what is this an example of?

A)Syn flood
B)Buffer overflow
C)Incomplete mediation
D)Logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
What is the term for malware that changes the way the operating system functions to avoid detection?

A)Rootkit
B)Boot sector virus
C)Spyware
D)Dieware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Johnny received a "new version" of the game Solitaire in an e-mail.After running the program,a backdoor was installed on his computer without his knowledge.What kind of an attack is this?

A)Logic bomb
B)Hoax
C)Trojan
D)Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n)_______________ is a connection to a Windows interprocess communications share (IPC$).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is software that records and reports activities of the user (typically without their knowledge)called?

A)Snoopware
B)Malware
C)Spyware
D)Eyeware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
A computer system is attacked for one of two reasons: it is specifically targeted by the attacker,or it is a target of opportunity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The last step in minimizing possible avenues of attack is updating system patches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n)_______________ is a 32-bit number established by the host that is incremented for each packet sent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
TCP/IP hijacking and _______________ are terms used to refer to the process of taking control of an already existing session between a client and a server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What should be included in a security audit?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
How can social engineering be used to gain access to a computer network and what is the best way to prevent it from happening?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n)_______________ occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
_______________ is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
List and describe the steps a hacker takes to attack a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe some of the types of attacks that can be launched against a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
List and describe various types of malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
_______________ is an economic attack against the terms of using a new DNS entry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
A _______________ occurs when a program is provided more data for input than it was designed to handle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.