Chapter 2: Attacks, Concepts, and Techniques

Last updated about 2 years ago
11 questions
Required
1

What is the purpose of a rootkit?

Required
1

Which example illustrates how malware might be concealed?

Required
1

What is the most common goal of search engine optimization (SEO) poisoning?

Required
1

What is involved in a trojan horse attack ?

Required
1

In what way are zombies used in security attacks?

Remember:
a zombie is a computer or device infected with malware that is controlled remotely by a hacker.  Then the controlled devices (zombies) are used to carry out attacks on other computers.

Required
1

Which type of attack allows an attacker to use a brute force approach?

Required
1

What does the term social engineering mean in the cyber world?

Required
1

What is the primary goal of a DoS attack?

Required
1
An ____________ is the term used to describe a program written to take advantage of a known vulnerability
Other Answer Choices:
Attack
exploit
Required
1
An ___________ is the act of using an exploit against a vulnerability.
Other Answer Choices:
Exploit
Attack
Required
1
Draggable itemCorresponding Item
Trojan Horse
replicate themselves by independently exploiting vulnerabilities in networks
Virus
carries out malicious operations under the guise of a desired operation
Spyware
malicious executable code that is attached to other executable files
Tailgating
modify the operating system to create a backdoor
Phishing
hold a computer system or the data captive until a payment is made
Rootkit
deliver advertisements, usually comes with spyware
Worm
track and spy on the user
Brute-Force Attacks
The attacker manipulates a person who knows the password into providing it.
Ransomware
The attacker tries several possible passwords in an attempt to guess the password.
Spear Phishing
an attacker quickly follows an authorized person into a secure location.
Social Engineering
a highly targeted individual phishing attack
Adware
trick the recipient into installing malware on their device or sharing personal or financial information