Which of the following steps can best protect your computer from worms? CORRECT ANS-
Installing antimalware software
A wardialer is a legacy tool no longer in use.
True/False CORRECT ANS-False
A dictionary attack is a simple attack that primarily relies on users making poor password
choices.
True/False CORRECT ANS-True
Which type of attack involves capturing data packets from a network and transmitting them
later to produce an unauthorized effect? CORRECT ANS-Replay
A(n) ____ is any action that could damage an asset. CORRECT ANS-Threat
A(n) ____ is any weakness that makes it possible for a threat to cause harm to a computer or
network. CORRECT ANS-Vulnerability
,Which type of malware is a self-Contained program that replicates and sends copies to other
computers, generally across a network? CORRECT ANS-Worm
Which group is responsible for responding to any reported cyberattack? CORRECT ANS-
Incident response team
Spyware gathers information about a user through an Internet connection, without his or her
knowledge. CORRECT ANS-True
Barry discovers that an attacker is running an access point in a building adjacent to his
company. The access point is broadcasting the security set identifier (SSID) of an open
network owned by the coffee shop in his lobby. Which type of attack is likely taking place?
CORRECT ANS-Evil twin
Which password attack is typically used specifically against password files that contain
cryptographic hashes? CORRECT ANS-Birthday attacks
A phishing email is a fake or bogus email intended to trick the recipient into clicking on an
embedded URL link or opening an email attachment. CORRECT ANS-True
A birthday attack is a type of cryptographic attack that is used to make brute-force attack of
one-way hashes easier. CORRECT ANS-True
,A rootkit uses a directed broadcast to create a flood of network traffic for the victim
computer. CORRECT ANS-False
Which type of attack involves the creation of some deception in order to trick unsuspecting
users? CORRECT ANS-Fabrication
Vishing is a type of wireless network attack. CORRECT ANS-False
A phishing attack "poisons" a domain name on a domain name server. CORRECT ANS-False
Maria's company recently experienced a major system outage due to the failure of a critical
component. During that time period, the company did not register any sales through its
online site. Which type of loss did the company experience as a result of lost sales?
CORRECT ANS-Opportunity cost
An attacker uses exploit software when wardialing. CORRECT ANS-False
Which type of denial of service attack exploits the existence of software flaws to disrupt a
service? CORRECT ANS-Logic attack
Using a secure logon and authentication process is one of the six steps used to prevent
malware. CORRECT ANS-True
, An attacker attempting to break into a facility pulls the fire alarm to distract the security
guard manning an entry point. Which type of social engineering attack is the attacker using?
CORRECT ANS-Urgency
The anti-malware utility is one of the most popular backdoor tools in use today. CORRECT
ANS-False
A dictionary password attack is a type of attack in which one person, program, or computer
disguises itself as another person, program, or computer to gain access to some resource.
CORRECT ANS-False
Failing to prevent an attack all but invites an attack. CORRECT ANS-True
The main difference between a virus and a worm is that a virus does not need a host program
to infect. CORRECT ANS-False
Spam is some act intended to deceive or trick the receiver, normally in email messages.
CORRECT ANS-False
Which group is the most likely target of a social engineering attack? CORRECT ANS-
Receptionists and administrative assistants
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $24.49. You're not tied to anything after your purchase.