Evaluated CSIT 161 Questions And Answers Chapter 8
Evaluated CSIT 161 Questions And Answers Chapter 8 Which type of malware attaches to, or infects, other programs? - CORRECT ANSWER - Virus Spam is any unwanted message. - CORRECT ANSWER -True Which type of malicious software is a stand-alone program that propagates from one computer to another? - CORRECT ANSWER -Worm In the context of malware, which of the following best defines the term mobile code? - CORRECT ANSWER -Website active content A(n) __________ is a network of compromised computers that attackers use to launch attacks and spread malware. - CORRECT ANSWER -Botnet What does the TCP SYN flood attack do to cause a DDoS? - CORRECT ANSWER - Fills up the pending connections table Which type of attack tricks a user into providing personal information by masquerading as a legitimate website? - CORRECT ANSWER -Phishing The best defense from keystroke loggers is to carefully inspect the keyboard cable before using a computer because the logger must connect to the keyboard's cable. - CORRECT ANSWER -False How did viruses spread in the early days of malware? - CORRECT ANSWER -Diskettes What is the most common first phase of an attack? - CORRECT ANSWER - Reconnaissance and probing Which software tool provides extensive port-scanning capabilities? - CORRECT ANSWER -Nmap The defense-in-depth strategy ensures that an attacker must compromise multiple controls to reach any protected resource. - CORRECT ANSWER -True A honeypot is a sacrificial host with deliberately insecure services deployed at the edges of a network to act as bait for potential hacking attacks. - CORRECT ANSWER - True
Written for
- Institution
- CSIT 161
- Course
- CSIT 161
Document information
- Uploaded on
- November 17, 2023
- Number of pages
- 1
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
evaluated csit 161 questions and answers chapter 8