Chapter 3

Chapter 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

YOU THINK YOU KNOW AH?

YOU THINK YOU KNOW AH?

University - Professional Development

11 Qs

Governing Circular

Governing Circular

Professional Development

14 Qs

Desglose Endocrino

Desglose Endocrino

Professional Development

14 Qs

POST TEST IHT APP 2020 (DESEMBER)

POST TEST IHT APP 2020 (DESEMBER)

Professional Development

10 Qs

AIMRA

AIMRA

Professional Development

10 Qs

Mobile legends quiz melayu

Mobile legends quiz melayu

1st Grade - Professional Development

13 Qs

PowerPoint IMiL Quiz

PowerPoint IMiL Quiz

Professional Development

13 Qs

ROH JOB SHARING

ROH JOB SHARING

Professional Development

10 Qs

Chapter 3

Chapter 3

Assessment

Quiz

Other

Professional Development

Practice Problem

Hard

Created by

sam foon

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What occurs on a computer when data goes beyond the limits of a buffer?

a system exception

cross-site scripting

an SQL injection

a buffer overflow

Answer explanation

Refer to Chapter 3 - Slides 50 - Application Attacks
A buffer overflow occurs when data goes beyond the limits of a buffer. Buffers are memory areas allocated to an application. By changing data beyond the boundaries of a buffer, the application accesses memory allocated to other processes. This can lead to a system crash, data compromise, or provide escalation of privileges.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does a rootkit modify?

programs

Microsoft Word

operating system

Use antivirus software

Answer explanation

Refer to Chapter 3 - Slides 12 - Type of Malware
A rootkit modifies the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely. Most rootkits take advantage of software vulnerabilities to perform privilege escalation and modify system files. Privilege escalation takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data. It is also common for rootkits to modify system forensics and monitoring tools, making them very hard to detect. Often, a user must wipe and reinstall the operating system of a computer infected by a rootkit.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of virus

a type of worm

a type of logic bomb

a type of ransomware

Answer explanation

Refer to Chapter 3 - Slides 11 - Type of Malware
Ransomware holds a computer system, or the data it contains, captive until the target makes a payment. Ransomware usually works by encrypting data in the computer with a key unknown to the user. The user must pay a ransom to the criminals to remove the restriction.
Some other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Ransomware propagates as a Trojan horse and is the result of a downloaded file or some software weakness.
Payment through an untraceable payment system is always the criminal’s goal. Once the victim pays, the criminal supplies a program that decrypts the files or sends an unlock code. 

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name given to a program or program code that bypasses normal authentication?

backdoor

frontdoor

rootkit

logic bomb

Answer explanation

Refer to Chapter 3 - Slides 12 - Type of Malware
A backdoor refers to the program or code introduced by a criminal who has compromised a system. The backdoor bypasses the normal authentication used to access a system. A few common backdoor programs are Netbus and Back Orifice, which both allow remote access to unauthorized system users. The purpose of the backdoor is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system. Usually, criminals have authorized users unknowingly run a Trojan horse program on their machine to install the backdoor.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

smishing

grayware

zeroday attack

keyboard logging

Answer explanation

Refer to Chapter 3 - Slides 39 - Wireless and Mobile Attacks
SMiShing is short for SMS phishing. It uses Short Message Service (SMS) to send fake text messages. The criminals trick the user into visiting a website or calling a phone number. Unsuspecting victims may then provide sensitive information such as credit card information. Visiting a website might result in the user unknowingly downloading malware that infects the device.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the meaning of the term logic bomb?

a malicious virus

a malicious worm

a malicious program that hides itself in a legitimate program

a malicious program that uses a trigger to awaken the malicious code

Answer explanation

Refer to Chapter 3 - Slides 9 - Type of Malware
A logic bomb is a malicious program that uses a trigger to awaken the malicious code. For example, triggers can be dates, times, other programs running, or the deletion of a user account. The logic bomb remains inactive until that trigger event happens. Once activated, a logic bomb implements a malicious code that causes harm to a computer. A logic bomb can sabotage database records, erase files, and attack operating systems or applications. Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, CPU, memory, hard drives and power supplies. The logic bomb overdrives these devices until they overheat or fail.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

adware

pop-ups

spyware

trackers

Answer explanation

Refer to Chapter 3 - Slides 15 - Email and Browser Attacks
Adware typically displays annoying pop-ups to generate revenue for its authors

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?