ACTUAL Exam Questions and CORRECT
Answers
The malicious use of a computer code to modify the normal operations of a computer or network
is called a _____. - CORRECT ANSWER - Cyberattack
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too
many requests is called a ____ attack. - CORRECT ANSWER - DDoS
Specialized hardware or software that capture packets transmitted over a network are called
packet _____. - CORRECT ANSWER - Sniffers
An unsolicited email message is called ____. - CORRECT ANSWER - Spam
Firewall software used to block a user's access to specific Internet content is called a(n) _____
filter. - CORRECT ANSWER - Internet
A person who uses computers and the Internet to launch attacks against computer systems for
political or ideological reasons is called a ____. - CORRECT ANSWER - Cyberterrorist
A type of phishing that seeks to obtain personal information through malicious software that is
inserted on a victim's computer is called _____. - CORRECT ANSWER - Pharming
What does DDoS stand for? - CORRECT ANSWER - Distributed Denial of Service
A person who gains unauthorized access to networks in order to steal and corrupt information
and data is called a _____. - CORRECT ANSWER - Hacker