Filters
Question type

Study Flashcards

The macro virus infects the key operating system files located in a computer's boot sector._________________________

A) True
B) False

Correct Answer

verifed

verified

False

One form of e-mail attack that is also a DoS is called a mail spoof,in which an attacker routes large quantities of e-mail to the target._________________________

A) True
B) False

Correct Answer

verifed

verified

DoS attacks cannot be launched against routers.

A) True
B) False

Correct Answer

verifed

verified

A(n)____________________ is an object,person,or other entity that represents an ongoing danger to an asset.

Correct Answer

verifed

verified

In the well-known ____ attack,an attacker monitors (or sniffs) packets from the network,modifies them,and inserts them back into the network.


A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

There are generally two skill levels among hackers: expert and ____.


A) novice
B) journeyman
C) packet monkey
D) professional

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

"4-1-9" fraud is an example of a ____ attack.


A) social engineering
B) virus
C) worm
D) spam

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When information gatherers employ techniques that cross the threshold of what is legal or ethical,they are conducting industrial ____________________.

Correct Answer

verifed

verified

Which of the following is an example of a Trojan horse program?


A) Netsky
B) MyDoom
C) Klez
D) Happy99.exe

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Script ____________________ are hackers of limited skill who use expertly written software to attack a system.

Correct Answer

verifed

verified

Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.

A) True
B) False

Correct Answer

verifed

verified

False

A(n)____________________ hacks the public telephone network to make free calls or disrupt services.

Correct Answer

verifed

verified

A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.


A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

____________________ is a technique used to gain unauthorized access to computers,wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

Correct Answer

verifed

verified

Spoofing

Attempting to reverse-calculate a password is called ____________________.

Correct Answer

verifed

verified

List at least six general categories of threat.

Correct Answer

verifed

verified

Compromises to intellectual property
Sof...

View Answer

Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0,the browser will crash.


A) 64
B) 128
C) 256
D) 512

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

With electronic information is stolen,the crime is readily apparent.

A) True
B) False

Correct Answer

verifed

verified

A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.

A) True
B) False

Correct Answer

verifed

verified

____ is any technology that aids in gathering information about a person or organization without their knowledge.


A) A bot
B) Spyware
C) Trojan
D) Worm

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 78

Related Exams

Show Answer