Matching
Match the following terms to the appropriate definitions.
Premises:
Lost system functionality and effectiveness
An organized effort to use cyberattacks to disrupt computer systems
Computer code that is meant to damage or disrupt computer systems
A hacker takes advantage of a trust relationship within a network
A violent act that endangers human life
Programs that automate the entire hacking process
Malicious software that is attached to another program
An attack that combines features of several DoS attacks
Gathering of information about a target network using publicly available data
Attacks that send oversized IP packets to a computer system
Responses:
Terrorist incident
Malicious code attack
Ping of death
Autorooters
Loss of availability
Information warfare
Trust exploitation attack
Virus
Network reconnaissance
Stacheldraht
Correct Answer:
Premises:
Responses:
Lost system functionality and effectiveness
An organized effort to use cyberattacks to disrupt computer systems
Computer code that is meant to damage or disrupt computer systems
A hacker takes advantage of a trust relationship within a network
A violent act that endangers human life
Programs that automate the entire hacking process
Malicious software that is attached to another program
An attack that combines features of several DoS attacks
Gathering of information about a target network using publicly available data
Attacks that send oversized IP packets to a computer system
Premises:
Lost system functionality and effectiveness
An organized effort to use cyberattacks to disrupt computer systems
Computer code that is meant to damage or disrupt computer systems
A hacker takes advantage of a trust relationship within a network
A violent act that endangers human life
Programs that automate the entire hacking process
Malicious software that is attached to another program
An attack that combines features of several DoS attacks
Gathering of information about a target network using publicly available data
Attacks that send oversized IP packets to a computer system
Responses:
Related Questions
Q55: Which of the following are procedures to
Q56: _ are software applications that use a
Q57: _ are a type of trust exploitation
Q58: The National Strategy for the Physical Protection
Q59: What type of negative economic impact from
Q60: _ attacks can occur when a hacker
Q61: List each of the systems and networks
Q63: The adverse impact of a hacking attack
Q64: List and describe the negative economic effects
Q65: What should organizations do to help recover
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents