Chapter 2: Attacks, Concepts, and Techniques
star
star
star
star
star
Last updated about 2 years ago
11 questions
Required
1
What is the purpose of a rootkit?
What is the purpose of a rootkit?
Required
1
Which example illustrates how malware might be concealed?
Which example illustrates how malware might be concealed?
Required
1
What is the most common goal of search engine optimization (SEO) poisoning?
What is the most common goal of search engine optimization (SEO) poisoning?
Required
1
What is involved in a trojan horse attack ?
What is involved in a trojan horse attack ?
Required
1
In what way are zombies used in security attacks?
Remember: a zombie is a computer or device infected with malware that is controlled remotely by a hacker. Then the controlled devices (zombies) are used to carry out attacks on other computers.
In what way are zombies used in security attacks?
Remember:
a zombie is a computer or device infected with malware that is controlled remotely by a hacker. Then the controlled devices (zombies) are used to carry out attacks on other computers.
Required
1
Which type of attack allows an attacker to use a brute force approach?
Which type of attack allows an attacker to use a brute force approach?
Required
1
What does the term social engineering mean in the cyber world?
What does the term social engineering mean in the cyber world?
Required
1
What is the primary goal of a DoS attack?
What is the primary goal of a DoS attack?
Required
1
An ____________ is the term used to describe a program written to take advantage of a known vulnerability
Other Answer Choices:
Attack
exploit
Required
1
An ___________ is the act of using an exploit against a vulnerability.
Other Answer Choices:
Exploit
Attack
Required
1
| Draggable item | arrow_right_alt | Corresponding Item |
|---|---|---|
Trojan Horse | arrow_right_alt | replicate themselves by independently exploiting vulnerabilities in networks |
Virus | arrow_right_alt | carries out malicious operations under the guise of a desired operation |
Spyware | arrow_right_alt | malicious executable code that is attached to other executable files |
Tailgating | arrow_right_alt | modify the operating system to create a backdoor |
Phishing | arrow_right_alt | hold a computer system or the data captive until a payment is made |
Rootkit | arrow_right_alt | deliver advertisements, usually comes with spyware |
Worm | arrow_right_alt | track and spy on the user |
Brute-Force Attacks | arrow_right_alt | The attacker manipulates a person who knows the password into providing it. |
Ransomware | arrow_right_alt | The attacker tries several possible passwords in an attempt to guess the password. |
Spear Phishing | arrow_right_alt | an attacker quickly follows an authorized person into a secure location. |
Social Engineering | arrow_right_alt | a highly targeted individual phishing attack |
Adware | arrow_right_alt | trick the recipient into installing malware on their device or sharing personal or financial information |