Search Header Logo

Quiz_Software Attacks_chapter 2_AISe

Authored by Phạm toán

English

University

Used 9+ times

Quiz_Software Attacks_chapter 2_AISe
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It consists of code segments that attach to existing programs and take control of access to the targeted computer.

Active Web scripts

Virus

Worms

Trojan horses

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Gaining access to the system or network using a known or previously unknown/newly discovered access mechanism

Back door

Virus

Worms

Trojan horses

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Mail bombing

A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

It monitors data traveling over a network; it can be used both for legitimate management purposes and for stealing information from a network.

An attacker routes large quantities of e-mail to a target to overwhelm the receiver.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Packet sniffer monitors data traveling over a network; it can be used both for legitimate management purposes and for stealing ........................ from a network.

software

information

hardware

All is correct

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Man-in-the-middle

A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

An attacker monitors the network packets, modifies them, and inserts them back into the network.

An attacker routes large quantities of e-mail to a target to overwhelm the receiver.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

Spam

Spoofing

Mail bombing

Pharming

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Spoofing

A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

It attacks a browser’s address bar to redirect users to an illegitimate site for the purpose of obtaining private information.

An attacker routes large quantities of e-mail to a target to overwhelm the receiver.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?