Evaluated CSIT 161 Questions And Answers Chapter 8
Evaluated CSIT 161 Questions And Answers Chapter 8 Which type of malware attaches to, or infects, other programs? - CORRECT ANSWER - Virus Spam is any unwanted message. - CORRECT ANSWER -True Which type of malicious software is a stand-alone program that propagates from one computer to another? - CORRECT ANSWER -Worm In the context of malware, which of the following best defines the term mobile code? - CORRECT ANSWER -Website active content A(n) __________ is a network of compromised computers that attackers use to launch attacks and spread malware. - CORRECT ANSWER -Botnet What does the TCP SYN flood attack do to cause a DDoS? - CORRECT ANSWER - Fills up the pending connections table Which type of attack tricks a user into providing personal information by masquerading as a legitimate website? - CORRECT ANSWER -Phishing The best defense from keystroke loggers is to carefully inspect the keyboard cable before using a computer because the logger must connect to the keyboard's cable. - CORRECT ANSWER -False How did viruses spread in the early days of malware? - CORRECT ANSWER -Diskettes What is the most common first phase of an attack? - CORRECT ANSWER - Reconnaissance and probing Which software tool provides extensive port-scanning capabilities? - CORRECT ANSWER -Nmap The defense-in-depth strategy ensures that an attacker must compromise multiple controls to reach any protected resource. - CORRECT ANSWER -True A honeypot is a sacrificial host with deliberately insecure services deployed at the edges of a network to act as bait for potential hacking attacks. - CORRECT ANSWER - True
Escuela, estudio y materia
- Institución
- CSIT 161
- Grado
- CSIT 161
Información del documento
- Subido en
- 17 de noviembre de 2023
- Número de páginas
- 1
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
evaluated csit 161 questions and answers chapter 8