It consists of code segments that attach to existing programs and take control of access to the targeted computer.

Quiz_Software Attacks_chapter 2_AISe

Quiz
•
English
•
University
•
Hard
Phạm toán
Used 8+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Active Web scripts
Virus
Worms
Trojan horses
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Gaining access to the system or network using a known or previously unknown/newly discovered access mechanism
Back door
Virus
Worms
Trojan horses
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Mail bombing
A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.
It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.
It monitors data traveling over a network; it can be used both for legitimate management purposes and for stealing information from a network.
An attacker routes large quantities of e-mail to a target to overwhelm the receiver.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Packet sniffer monitors data traveling over a network; it can be used both for legitimate management purposes and for stealing ........................ from a network.
software
information
hardware
All is correct
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Man-in-the-middle
A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.
It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.
An attacker monitors the network packets, modifies them, and inserts them back into the network.
An attacker routes large quantities of e-mail to a target to overwhelm the receiver.
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.
Spam
Spoofing
Mail bombing
Pharming
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Spoofing
A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.
It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.
It attacks a browser’s address bar to redirect users to an illegitimate site for the purpose of obtaining private information.
An attacker routes large quantities of e-mail to a target to overwhelm the receiver.
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Exploring Computer Networks

Quiz
•
12th Grade - University
15 questions
Computer Networks & Internet Quiz

Quiz
•
University
10 questions
ESP Course and Program Objectives Quiz

Quiz
•
University
15 questions
hack:DiD

Quiz
•
University
10 questions
Ghosn 2013. Developing Motivating Materials for Refugee Children

Quiz
•
University
12 questions
Module #8. Computers Tomorrow

Quiz
•
University
15 questions
Network Quiz

Quiz
•
12th Grade - University
15 questions
Crime

Quiz
•
11th Grade - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade