Log in
Sign up for FREE
arrow_back
Library

Chapter 2: Attacks, Concepts, and Techniques

star
star
star
star
star
Last updated over 2 years ago
11 questions
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Question 1
1.

What is the purpose of a rootkit?

Question 2
2.

Which example illustrates how malware might be concealed?

Question 3
3.

What is the most common goal of search engine optimization (SEO) poisoning?

Question 4
4.

What is involved in a trojan horse attack ?

Question 5
5.

In what way are zombies used in security attacks?

Remember:
a zombie is a computer or device infected with malware that is controlled remotely by a hacker.  Then the controlled devices (zombies) are used to carry out attacks on other computers.

Question 6
6.

Which type of attack allows an attacker to use a brute force approach?

Question 7
7.

What does the term social engineering mean in the cyber world?

Question 8
8.

What is the primary goal of a DoS attack?

Question 9
9.
An ____________ is the term used to describe a program written to take advantage of a known vulnerability
Other Answer Choices:
Attack
exploit
Question 10
10.
An ___________ is the act of using an exploit against a vulnerability.
Other Answer Choices:
Exploit
Attack
Question 11
11.
Draggable itemarrow_right_altCorresponding Item
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
They are maliciously formed code segments used to replace legitimate applications.
executes when software is run on a computer
infects computers by attaching to software code
manipulation of individual into performing actions or divulging confidential information
Trojan Horse
replicate themselves by independently exploiting vulnerabilities in networks
Brute-Force Attacks
carries out malicious operations under the guise of a desired operation
Social Engineering
malicious executable code that is attached to other executable files
Ransomware
modify the operating system to create a backdoor
Spyware
hold a computer system or the data captive until a payment is made
Phishing
deliver advertisements, usually comes with spyware
Spear Phishing
track and spy on the user
Rootkit
The attacker manipulates a person who knows the password into providing it.
Virus
The attacker tries several possible passwords in an attempt to guess the password.
Tailgating
an attacker quickly follows an authorized person into a secure location.
Adware
a highly targeted individual phishing attack
Worm
trick the recipient into installing malware on their device or sharing personal or financial information