Log in
Sign up for FREE
arrow_back
Library

Chapter 2: Attacks, Concepts, and Techniques

star
star
star
star
star
Last updated over 2 years ago
11 questions
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Question 1
1.

What is the purpose of a rootkit?

Question 2
2.

Which example illustrates how malware might be concealed?

Question 3
3.

What is the most common goal of search engine optimization (SEO) poisoning?

Question 4
4.

What is involved in a trojan horse attack ?

Question 5
5.

In what way are zombies used in security attacks?

Remember:
a zombie is a computer or device infected with malware that is controlled remotely by a hacker.  Then the controlled devices (zombies) are used to carry out attacks on other computers.

Question 6
6.

Which type of attack allows an attacker to use a brute force approach?

Question 7
7.

What does the term social engineering mean in the cyber world?

Question 8
8.

What is the primary goal of a DoS attack?

Question 9
9.
An ____________ is the term used to describe a program written to take advantage of a known vulnerability
Other Answer Choices:
Attack
exploit
Question 10
10.
An ___________ is the act of using an exploit against a vulnerability.
Other Answer Choices:
Exploit
Attack
Question 11
11.
Draggable itemarrow_right_altCorresponding Item
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
arrow_right_alt
They are maliciously formed code segments used to replace legitimate applications.
executes when software is run on a computer
infects computers by attaching to software code
manipulation of individual into performing actions or divulging confidential information
Brute-Force Attacks
replicate themselves by independently exploiting vulnerabilities in networks
Rootkit
carries out malicious operations under the guise of a desired operation
Tailgating
malicious executable code that is attached to other executable files
Spear Phishing
modify the operating system to create a backdoor
Virus
hold a computer system or the data captive until a payment is made
Phishing
deliver advertisements, usually comes with spyware
Worm
track and spy on the user
Trojan Horse
The attacker manipulates a person who knows the password into providing it.
Adware
The attacker tries several possible passwords in an attempt to guess the password.
Spyware
an attacker quickly follows an authorized person into a secure location.
Social Engineering
a highly targeted individual phishing attack
Ransomware
trick the recipient into installing malware on their device or sharing personal or financial information