Log in
Sign up for FREE
arrow_back
Library

Chapter 2: Attacks, Concepts, and Techniques

star
star
star
star
star
Last updated about 2 years ago
11 questions
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Required
1
Question 1
1.

What is the purpose of a rootkit?

Question 2
2.

Which example illustrates how malware might be concealed?

Question 3
3.

What is the most common goal of search engine optimization (SEO) poisoning?

Question 4
4.

What is involved in a trojan horse attack ?

Question 5
5.

In what way are zombies used in security attacks?

Remember:
a zombie is a computer or device infected with malware that is controlled remotely by a hacker.  Then the controlled devices (zombies) are used to carry out attacks on other computers.

Question 6
6.

Which type of attack allows an attacker to use a brute force approach?

Question 7
7.

What does the term social engineering mean in the cyber world?

Question 8
8.

What is the primary goal of a DoS attack?

Question 9
9.
An ____________ is the term used to describe a program written to take advantage of a known vulnerability
Other Answer Choices:
Attack
exploit
Question 10
10.
An ___________ is the act of using an exploit against a vulnerability.
Other Answer Choices:
Exploit
Attack
Question 11
11.
Draggable itemarrow_right_altCorresponding Item
Spear Phishing
arrow_right_alt
replicate themselves by independently exploiting vulnerabilities in networks
Spyware
arrow_right_alt
carries out malicious operations under the guise of a desired operation
Tailgating
arrow_right_alt
malicious executable code that is attached to other executable files
Ransomware
arrow_right_alt
modify the operating system to create a backdoor
Worm
arrow_right_alt
hold a computer system or the data captive until a payment is made
Social Engineering
arrow_right_alt
deliver advertisements, usually comes with spyware
Brute-Force Attacks
arrow_right_alt
track and spy on the user
Virus
arrow_right_alt
The attacker manipulates a person who knows the password into providing it.
Phishing
arrow_right_alt
The attacker tries several possible passwords in an attempt to guess the password.
Trojan Horse
arrow_right_alt
an attacker quickly follows an authorized person into a secure location.
Rootkit
arrow_right_alt
a highly targeted individual phishing attack
Adware
arrow_right_alt
trick the recipient into installing malware on their device or sharing personal or financial information