Quiz_Software Attacks_chapter 2_AISe

Quiz_Software Attacks_chapter 2_AISe

University

14 Qs

quiz-placeholder

Similar activities

Exploring Computer Networks

Exploring Computer Networks

12th Grade - University

15 Qs

Computer Networks & Internet Quiz

Computer Networks & Internet Quiz

University

15 Qs

ESP Course and Program Objectives Quiz

ESP Course and Program Objectives Quiz

University

10 Qs

hack:DiD

hack:DiD

University

15 Qs

ECOM-U3

ECOM-U3

University

16 Qs

Network Quiz

Network Quiz

12th Grade - University

15 Qs

Phrasal Verbs (Technology and communication solutions)

Phrasal Verbs (Technology and communication solutions)

University

12 Qs

Crime

Crime

11th Grade - University

15 Qs

Quiz_Software Attacks_chapter 2_AISe

Quiz_Software Attacks_chapter 2_AISe

Assessment

Quiz

English

University

Hard

Created by

Phạm toán

Used 8+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It consists of code segments that attach to existing programs and take control of access to the targeted computer.

Active Web scripts

Virus

Worms

Trojan horses

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Gaining access to the system or network using a known or previously unknown/newly discovered access mechanism

Back door

Virus

Worms

Trojan horses

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Mail bombing

A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

It monitors data traveling over a network; it can be used both for legitimate management purposes and for stealing information from a network.

An attacker routes large quantities of e-mail to a target to overwhelm the receiver.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Packet sniffer monitors data traveling over a network; it can be used both for legitimate management purposes and for stealing ........................ from a network.

software

information

hardware

All is correct

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Man-in-the-middle

A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

An attacker monitors the network packets, modifies them, and inserts them back into the network.

An attacker routes large quantities of e-mail to a target to overwhelm the receiver.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

Spam

Spoofing

Mail bombing

Pharming

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Spoofing

A technique used to gain unauthorized access; an intruder (a person who enters a building or an area illegally) assumes a trusted IP address.

It is considered more a nuisance than an attack, though it is emerging as a vector for some attacks.

It attacks a browser’s address bar to redirect users to an illegitimate site for the purpose of obtaining private information.

An attacker routes large quantities of e-mail to a target to overwhelm the receiver.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?