100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 261 Quiz 2 Questions with All Correct Answers $12.99   Add to cart

Exam (elaborations)

ITN 261 Quiz 2 Questions with All Correct Answers

 0 view  0 purchase
  • Course
  • ITN 261
  • Institution
  • ITN 261

ITN 261 Quiz 2 Questions with All Correct Answers Which of the following types of viruses is designed to change its code and "shape" to avoid detection by virus scanners, which would look for a specific virus code and not the new version? - Answer- Polymorphic virus Which of the following ty...

[Show more]

Preview 2 out of 14  pages

  • October 10, 2024
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 261
  • ITN 261
avatar-seller
Scholarsstudyguide
ITN 261 Quiz 2 Questions with All
Correct Answers

Which of the following types of viruses is designed to change its code and "shape" to
avoid detection by virus scanners, which would look for a specific virus code and not the
new version? - Answer- Polymorphic virus

Which of the following types of viruses is a piece of code or software designed to lie in
wait on a system until a specified event occurs? - Answer- Logic bomb

Which of the following types of viruses infects using multiple attack vectors, including
the boot sector and executable files on the hard drive? - Answer- Multipartite virus

Which of the following types of viruses infects and operates through the use of a
programming language built into applications such as Microsoft Office in the form of
Visual Basic for Applications (VBA)? - Answer- Macro virus

Which of the following statements is NOT true about dictionary-based virus detection? -
Answer- This method can detect both viruses that it knows about and those it does not
know about.

Which of the following is a malware program designed to replicate without attaching to
or infecting other files on a host system? - Answer- Worm

Which of the following is malware that looks legitimate but hides a payload that does
something unwanted? - Answer- Trojan

Which one of the following is NOT a goal of Trojans? - Answer- Replicating

Which of the following is a remote access Trojan authored entirely in Delphi that uses
TCP port 26097 by default? - Answer- Let Me Rule

Which of the following is a next-generation Trojan tool that was designed to accept
customized, specially designed plug-ins? - Answer- Back Orifice (BO2K)

A software development kit specifically designed to facilitate the design and
development of Trojans is called a: - Answer- Trojan construction kit.

A section of the hard drive record responsible for assisting in locating the operating
system to boot the computer is called the: - Answer- master boot records (MBRs).

, Which of the following is NOT one of the key goals of a backdoor? - Answer- To obtain
a Trojan construction kit

Which of the following is a U.S. Department of Defense (DoD) standard that sets basic
requirements for assessing the effectiveness of computer security controls built into a
computer system? - Answer- Trusted Computer System Evaluation Criteria (TCSEC)

A process where communications are redirected to different ports than they would
normally be destined for is called: - Answer- port redirection.

An organization's Web server is often the public face of the organization that customers
and clients see first. - Answer- T

A buffer overflow can result in data being corrupted or overwritten. - Answer- T

A denial of service (DoS) attack is considered a critical problem because it is very
difficult to defeat. - Answer- F

A distributed denial of service (DDoS) attack is mostly an annoyance; however, a denial
of service (DoS) attack is much more of a problem. - Answer- F

Error messages should be considered a potential Web server vulnerability because they
can provide vital information to an attacker. - Answer- T

A good way to prevent Structured Query Language (SQL) injection attacks is to use
input validation, which ensures that only approved characters are accepted. - Answer- T

Structured Query Language (SQL) injections require very little skill or knowledge to
execute. - Answer- F

A number of different methods can be used to deface a Web site. - Answer- T

Defacing a Web site is one of the most common acts of vandalism against Web sites. -
Answer- T

Input validation refers to restricting the type of input or data the Web site will accept so
that mistakes will not be entered into the system. - Answer- T

Brutus is a password cracker that is designed to decode different password types
present in Web applications. - Answer- T

A poison null byte attack uploads masses of files to a server with the goal of filling up
the hard drive on the server in an attempt to cause the application to crash. - Answer- F

A session, the connection that a client has with the server application, should use the
same identifier, encryption, and other parameters every time a new connection between

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78462 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart