Chapter 3

Chapter 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

bollywood songs

bollywood songs

1st Grade - Professional Development

6 Qs

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

Keeping Bloomfield Safe

Keeping Bloomfield Safe

Professional Development

10 Qs

Phishing - Learning Tales

Phishing - Learning Tales

Professional Development

10 Qs

Risk Quiz

Risk Quiz

Professional Development

10 Qs

Ciberseguretat per a usuaris en entorns híbrids

Ciberseguretat per a usuaris en entorns híbrids

Professional Development

10 Qs

Q010. E-MARKETING: EMAIL MARKETING

Q010. E-MARKETING: EMAIL MARKETING

University - Professional Development

8 Qs

Sk8 the Infinity

Sk8 the Infinity

Professional Development

10 Qs

Chapter 3

Chapter 3

Assessment

Quiz

Other

Professional Development

Hard

Created by

sam foon

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What occurs on a computer when data goes beyond the limits of a buffer?

a system exception

cross-site scripting

an SQL injection

a buffer overflow

Answer explanation

Refer to Chapter 3 - Slides 50 - Application Attacks
A buffer overflow occurs when data goes beyond the limits of a buffer. Buffers are memory areas allocated to an application. By changing data beyond the boundaries of a buffer, the application accesses memory allocated to other processes. This can lead to a system crash, data compromise, or provide escalation of privileges.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does a rootkit modify?

programs

Microsoft Word

operating system

Use antivirus software

Answer explanation

Refer to Chapter 3 - Slides 12 - Type of Malware
A rootkit modifies the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely. Most rootkits take advantage of software vulnerabilities to perform privilege escalation and modify system files. Privilege escalation takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data. It is also common for rootkits to modify system forensics and monitoring tools, making them very hard to detect. Often, a user must wipe and reinstall the operating system of a computer infected by a rootkit.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of virus

a type of worm

a type of logic bomb

a type of ransomware

Answer explanation

Refer to Chapter 3 - Slides 11 - Type of Malware
Ransomware holds a computer system, or the data it contains, captive until the target makes a payment. Ransomware usually works by encrypting data in the computer with a key unknown to the user. The user must pay a ransom to the criminals to remove the restriction.
Some other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Ransomware propagates as a Trojan horse and is the result of a downloaded file or some software weakness.
Payment through an untraceable payment system is always the criminal’s goal. Once the victim pays, the criminal supplies a program that decrypts the files or sends an unlock code. 

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name given to a program or program code that bypasses normal authentication?

backdoor

frontdoor

rootkit

logic bomb

Answer explanation

Refer to Chapter 3 - Slides 12 - Type of Malware
A backdoor refers to the program or code introduced by a criminal who has compromised a system. The backdoor bypasses the normal authentication used to access a system. A few common backdoor programs are Netbus and Back Orifice, which both allow remote access to unauthorized system users. The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system. Usually, criminals have authorized users unknowingly run a Trojan horse program on their machine to install the backdoor.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

smishing

grayware

zeroday attack

keyboard logging

Answer explanation

Refer to Chapter 3 - Slides 39 - Wireless and Mobile Attacks
SMiShing is short for SMS phishing. It uses Short Message Service (SMS) to send fake text messages. The criminals trick the user into visiting a website or calling a phone number. Unsuspecting victims may then provide sensitive information such as credit card information. Visiting a website might result in the user unknowingly downloading malware that infects the device.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the meaning of the term logic bomb?

a malicious virus

a malicious worm

a malicious program that hides itself in a legitimate program

a malicious program that uses a trigger to awaken the malicious code

Answer explanation

Refer to Chapter 3 - Slides 9 - Type of Malware
A logic bomb is a malicious program that uses a trigger to awaken the malicious code. For example, triggers can be dates, times, other programs running, or the deletion of a user account. The logic bomb remains inactive until that trigger event happens. Once activated, a logic bomb implements a malicious code that causes harm to a computer. A logic bomb can sabotage database records, erase files, and attack operating systems or applications. Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, CPU, memory, hard drives and power supplies. The logic bomb overdrives these devices until they overheat or fail.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

adware

pop-ups

spyware

trackers

Answer explanation

Refer to Chapter 3 - Slides 15 - Email and Browser Attacks
Adware typically displays annoying pop-ups to generate revenue for its authors

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?