What occurs on a computer when data goes beyond the limits of a buffer?

Chapter 3

Quiz
•
Other
•
Professional Development
•
Hard
sam foon
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
a system exception
cross-site scripting
an SQL injection
a buffer overflow
Answer explanation
Refer to Chapter 3 - Slides 50 - Application Attacks
A buffer overflow occurs when data goes beyond the limits of a buffer. Buffers are memory areas allocated to an application. By changing data beyond the boundaries of a buffer, the application accesses memory allocated to other processes. This can lead to a system crash, data compromise, or provide escalation of privileges.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What does a rootkit modify?
programs
Microsoft Word
operating system
Use antivirus software
Answer explanation
Refer to Chapter 3 - Slides 12 - Type of Malware
A rootkit modifies the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely. Most rootkits take advantage of software vulnerabilities to perform privilege escalation and modify system files. Privilege escalation takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data. It is also common for rootkits to modify system forensics and monitoring tools, making them very hard to detect. Often, a user must wipe and reinstall the operating system of a computer infected by a rootkit.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
a type of virus
a type of worm
a type of logic bomb
a type of ransomware
Answer explanation
Refer to Chapter 3 - Slides 11 - Type of Malware
Ransomware holds a computer system, or the data it contains, captive until the target makes a payment. Ransomware usually works by encrypting data in the computer with a key unknown to the user. The user must pay a ransom to the criminals to remove the restriction.
Some other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Ransomware propagates as a Trojan horse and is the result of a downloaded file or some software weakness.
Payment through an untraceable payment system is always the criminal’s goal. Once the victim pays, the criminal supplies a program that decrypts the files or sends an unlock code.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the name given to a program or program code that bypasses normal authentication?
backdoor
frontdoor
rootkit
logic bomb
Answer explanation
Refer to Chapter 3 - Slides 12 - Type of Malware
A backdoor refers to the program or code introduced by a criminal who has compromised a system. The backdoor bypasses the normal authentication used to access a system. A few common backdoor programs are Netbus and Back Orifice, which both allow remote access to unauthorized system users. The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system. Usually, criminals have authorized users unknowingly run a Trojan horse program on their machine to install the backdoor.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
smishing
grayware
zeroday attack
keyboard logging
Answer explanation
Refer to Chapter 3 - Slides 39 - Wireless and Mobile Attacks
SMiShing is short for SMS phishing. It uses Short Message Service (SMS) to send fake text messages. The criminals trick the user into visiting a website or calling a phone number. Unsuspecting victims may then provide sensitive information such as credit card information. Visiting a website might result in the user unknowingly downloading malware that infects the device.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the meaning of the term logic bomb?
a malicious virus
a malicious worm
a malicious program that hides itself in a legitimate program
a malicious program that uses a trigger to awaken the malicious code
Answer explanation
Refer to Chapter 3 - Slides 9 - Type of Malware
A logic bomb is a malicious program that uses a trigger to awaken the malicious code. For example, triggers can be dates, times, other programs running, or the deletion of a user account. The logic bomb remains inactive until that trigger event happens. Once activated, a logic bomb implements a malicious code that causes harm to a computer. A logic bomb can sabotage database records, erase files, and attack operating systems or applications. Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, CPU, memory, hard drives and power supplies. The logic bomb overdrives these devices until they overheat or fail.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the name for the type of software that generates revenue by generating annoying pop-ups?
adware
pop-ups
spyware
trackers
Answer explanation
Refer to Chapter 3 - Slides 15 - Email and Browser Attacks
Adware typically displays annoying pop-ups to generate revenue for its authors
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Sk8 the Infinity

Quiz
•
Professional Development
6 questions
bollywood songs

Quiz
•
1st Grade - Professio...
10 questions
WPS Quiz 2

Quiz
•
Professional Development
12 questions
Ultra hard DBZ quiz

Quiz
•
KG - Professional Dev...
10 questions
Keeping Bloomfield Safe

Quiz
•
Professional Development
15 questions
ESET Post Training Assessment 2023

Quiz
•
Professional Development
10 questions
Risk Quiz

Quiz
•
Professional Development
11 questions
The Legend of Zelda Breath of the Wild FOR PROS by: C#UNGI

Quiz
•
KG - Professional Dev...
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade