Deck 3: Network and Computer Attacks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 3: Network and Computer Attacks
1
In a buffer overflow attack,an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.
True
2
When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?
A) buffer overflow
B) DoS
C) DDoS
D) session hijacking
A) buffer overflow
B) DoS
C) DDoS
D) session hijacking
A
3
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
A) virus
B) Trojan
C) worm
D) shell
A) virus
B) Trojan
C) worm
D) shell
C
4
Malware is malicious software,such as a virus,worm,or Trojan program,introduced into a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Malware programs cannot be detected by antivirus programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The acronym IDS stands for which of the following?
A) Intrusion Detection System
B) Information Dissemination System
C) Information Destruction System
D) Intruder Dispersal System
A) Intrusion Detection System
B) Information Dissemination System
C) Information Destruction System
D) Intruder Dispersal System
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which type of program can mitigate some risks associated with malware?
A) shells
B) bots
C) antivirus
D) rootkits
A) shells
B) bots
C) antivirus
D) rootkits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
What type of malicious computer programs present themselves as useful computer programs or applications?
A) macro viruses
B) worms
C) Spyware programs
D) Trojan programs
A) macro viruses
B) worms
C) Spyware programs
D) Trojan programs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
A) shell
B) virus
C) keylogger
D) rootkit
A) shell
B) virus
C) keylogger
D) rootkit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What type of virus is used to lock a user's system,or cloud accounts until the system's owner complies by paying the attacker a monetary fee?
A) keylogger
B) rootkit
C) ransomware
D) macro
A) keylogger
B) rootkit
C) ransomware
D) macro
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later.What means of access is the attacker utilizing?
A) backdoor
B) shell
C) worm
D) macro virus
A) backdoor
B) shell
C) worm
D) macro virus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?
A) macro
B) rootkit
C) keylogger
D) adware
A) macro
B) rootkit
C) keylogger
D) adware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following sometimes displays a banner that notifies the user of its presence?
A) Spyware
B) Adware
C) Webware
D) Malware
A) Spyware
B) Adware
C) Webware
D) Malware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A DDoS attack is launched against a host from a single server or workstation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Whitelisting allows only approved programs to run on a computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The virus signature file is maintained by what type of software?
A) antivirus
B) keylogger
C) remote control
D) firewall
A) antivirus
B) keylogger
C) remote control
D) firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?
A) Host security
B) Server security
C) Computer security
D) Network security
A) Host security
B) Server security
C) Computer security
D) Network security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is created after an attack and usually hides within the OS tools,so it is almost impossible to detect?
A) toolbox
B) rootkit
C) shell
D) macro virus
A) toolbox
B) rootkit
C) shell
D) macro virus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
If an attacker wishes to collect confidential financial data,passwords,PINs and any personal data stored on your computer which of the following programs would they choose to use?
A) Adware
B) Spybot
C) Malware
D) Spyware
A) Adware
B) Spybot
C) Malware
D) Spyware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which type of attack cripples the network and prevents legitimate users from accessing network resources?
A) buffer overflow
B) session hijacking
C) social engineering
D) denial-of-service
A) buffer overflow
B) session hijacking
C) social engineering
D) denial-of-service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Describe the basic function and creation process of a macro virus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?
A) Man-in-the-Middle
B) Ping of Death
C) Middle-Capture
D) DDOS
A) Man-in-the-Middle
B) Ping of Death
C) Middle-Capture
D) DDOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Explain how the two different types of keyloggers are used?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
How does a buffer overflow attack work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
A) signatures
B) heuristics
C) macros
D) bots
A) signatures
B) heuristics
C) macros
D) bots
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
What is a DDoS attack?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Explain how a basic computer virus operates and how it uses other host programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What is spyware and how does it operate?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A computer hacker may use a phishing e-mail to lure a user into following a malicious link.What type of technique is being used by the computer hacker?
A) mail fraud
B) heuristics
C) ransoming
D) social engineering
A) mail fraud
B) heuristics
C) ransoming
D) social engineering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What types of ports do successful Trojan programs commonly use?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?
A) rotary locks
B) combination locks
C) card access
D) deadbolt locks
A) rotary locks
B) combination locks
C) card access
D) deadbolt locks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What type of attack causes the victim's computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?
A) MTU ping
B) Ping of Death
C) buffer overflow
D) session hijacking
A) MTU ping
B) Ping of Death
C) buffer overflow
D) session hijacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
When a computer hacker uses multiple compromised computers to carry out a DDOS attack,the compromised computers are usually referred to as which of the following?
A) viruses
B) zombies
C) macros
D) cyborgs
A) viruses
B) zombies
C) macros
D) cyborgs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
What is the difference between spyware and adware?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Explain the advantages of application whitelisting?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?
A) signatures
B) heuristics
C) macros
D) bots
A) signatures
B) heuristics
C) macros
D) bots
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
How do Trojan programs operate?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?
A) A DoS attack
B) Ping of Death
C) A buffer overflow attack
D) Session hijacking
A) A DoS attack
B) Ping of Death
C) A buffer overflow attack
D) Session hijacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?
A) eavesdropping
B) overflowing
C) injecting
D) capturing
A) eavesdropping
B) overflowing
C) injecting
D) capturing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?
A) Viruses
B) Keyloggers
C) Macro viruses
D) Shells
A) Viruses
B) Keyloggers
C) Macro viruses
D) Shells
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that usually hides in the OS tools,so it's almost impossible to detect
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that usually hides in the OS tools,so it's almost impossible to detect
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Hardware devices or software that can be used to capture keystrokes on a computer
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Hardware devices or software that can be used to capture keystrokes on a computer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious software introduced into a network to help an attacker accomplish their goals
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious software introduced into a network to help an attacker accomplish their goals
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious program that attaches itself to a file or another program
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Malicious program that attaches itself to a file or another program
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Network of robot computers
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Network of robot computers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that prevents legitimate users from accessing network resources
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
An attack that prevents legitimate users from accessing network resources
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Attackers inject themselves between two parties or systems communicating with one another
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Attackers inject themselves between two parties or systems communicating with one another
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Virus that locks a target system until a demanded fee is paid
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
Virus that locks a target system until a demanded fee is paid
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Match each item with a statement below.a.botnet
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
b.rootkit
c.Trojan
d.Ping of Death
e.DoS
f.Man-in-the-Middle
g.keyloggers
h.malware
i.virus
j.ransomware
A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck