
Chapter 3
Quiz
•
Other
•
Professional Development
•
Practice Problem
•
Hard
sam foon
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What occurs on a computer when data goes beyond the limits of a buffer?
a system exception
cross-site scripting
an SQL injection
a buffer overflow
Answer explanation
Refer to Chapter 3 - Slides 50 - Application Attacks
A buffer overflow occurs when data goes beyond the limits of a buffer. Buffers are memory areas allocated to an application. By changing data beyond the boundaries of a buffer, the application accesses memory allocated to other processes. This can lead to a system crash, data compromise, or provide escalation of privileges.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What does a rootkit modify?
programs
Microsoft Word
operating system
Use antivirus software
Answer explanation
Refer to Chapter 3 - Slides 12 - Type of Malware
A rootkit modifies the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely. Most rootkits take advantage of software vulnerabilities to perform privilege escalation and modify system files. Privilege escalation takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data. It is also common for rootkits to modify system forensics and monitoring tools, making them very hard to detect. Often, a user must wipe and reinstall the operating system of a computer infected by a rootkit.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
a type of virus
a type of worm
a type of logic bomb
a type of ransomware
Answer explanation
Refer to Chapter 3 - Slides 11 - Type of Malware
Ransomware holds a computer system, or the data it contains, captive until the target makes a payment. Ransomware usually works by encrypting data in the computer with a key unknown to the user. The user must pay a ransom to the criminals to remove the restriction.
Some other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Ransomware propagates as a Trojan horse and is the result of a downloaded file or some software weakness.
Payment through an untraceable payment system is always the criminal’s goal. Once the victim pays, the criminal supplies a program that decrypts the files or sends an unlock code.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the name given to a program or program code that bypasses normal authentication?
backdoor
frontdoor
rootkit
logic bomb
Answer explanation
Refer to Chapter 3 - Slides 12 - Type of Malware
A backdoor refers to the program or code introduced by a criminal who has compromised a system. The backdoor bypasses the normal authentication used to access a system. A few common backdoor programs are Netbus and Back Orifice, which both allow remote access to unauthorized system users. The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system. Usually, criminals have authorized users unknowingly run a Trojan horse program on their machine to install the backdoor.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
smishing
grayware
zeroday attack
keyboard logging
Answer explanation
Refer to Chapter 3 - Slides 39 - Wireless and Mobile Attacks
SMiShing is short for SMS phishing. It uses Short Message Service (SMS) to send fake text messages. The criminals trick the user into visiting a website or calling a phone number. Unsuspecting victims may then provide sensitive information such as credit card information. Visiting a website might result in the user unknowingly downloading malware that infects the device.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the meaning of the term logic bomb?
a malicious virus
a malicious worm
a malicious program that hides itself in a legitimate program
a malicious program that uses a trigger to awaken the malicious code
Answer explanation
Refer to Chapter 3 - Slides 9 - Type of Malware
A logic bomb is a malicious program that uses a trigger to awaken the malicious code. For example, triggers can be dates, times, other programs running, or the deletion of a user account. The logic bomb remains inactive until that trigger event happens. Once activated, a logic bomb implements a malicious code that causes harm to a computer. A logic bomb can sabotage database records, erase files, and attack operating systems or applications. Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, CPU, memory, hard drives and power supplies. The logic bomb overdrives these devices until they overheat or fail.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the name for the type of software that generates revenue by generating annoying pop-ups?
adware
pop-ups
spyware
trackers
Answer explanation
Refer to Chapter 3 - Slides 15 - Email and Browser Attacks
Adware typically displays annoying pop-ups to generate revenue for its authors
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
HOW TO GIVE DIRECTIONS
Quiz
•
10th Grade - Professi...
13 questions
Prodigy Epics
Quiz
•
Professional Development
8 questions
Meme Quiz
Quiz
•
1st Grade - Professio...
10 questions
Annual Training FY2023
Quiz
•
Professional Development
10 questions
HEM Chapter 1
Quiz
•
Professional Development
15 questions
UTAR Industrial Session
Quiz
•
University - Professi...
10 questions
¿cuanto conoces a los youtubers?
Quiz
•
Professional Development
15 questions
Labor Relations and Negotations 1
Quiz
•
University - Professi...
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Other
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
25 questions
Christmas Movies
Quiz
•
Professional Development
20 questions
Christmas Trivia
Quiz
•
Professional Development
15 questions
Fun Holiday Trivia
Quiz
•
Professional Development
25 questions
Name That Tune - Christmas
Quiz
•
Professional Development
29 questions
Christmas Song Emoji Pictionary
Quiz
•
Professional Development
9 questions
Holiday Movie Trivia
Lesson
•
Professional Development
34 questions
Winter Trivia
Quiz
•
Professional Development
