1. What is the primary objective of conducting reconnaissance in computer attacks?
ias615: Group 1 : Computer Attack (Part 1)

Quiz
•
Computers
•
University
•
Hard
NUR Thaqifah
Used 7+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A) To execute the attack successfully
B) To cover tracks after the attack
C) To identify potential vulnerabilities and gather information about the target
D) To gain control of hijacked computers
2.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
2. What is hacking primarily defined as in the context of computer attacks?
A) Unauthorized access to computer systems using social engineering techniques.
B) Gaining control of a computer to carry out illicit activities without the user's knowledge.
C) Sending unsolicited messages to many people simultaneously to spread malware.
D) The unauthorized access, modification, or use of an electronic device or some element of a computer system.
3.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
3. Which term refers to the gaining control of a computer to carry out illicit activities without the user's knowledge?
A) Hacking
B) Social engineering
C) Hijacking
D) Bot herding
4.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
4. What is a botnet primarily used for?
A) Performing denial-of-service attacks and spreading malware
B) Executing hacking attempts
C)Social engineering attacks
D) Researching known vulnerabilities in software
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
5. What is the main objective of a denial-of-service (DoS) attack?
A) To gain unauthorized access to information systems
B) To recover forgotten passwords
C) To make a resource unavailable to its users
D) To generate usernames and passwords for credential recycling
6.
MULTIPLE CHOICE QUESTION
10 sec • 2 pts
6. What is a password cracking?
A) Sending unsolicited messages to many people simultaneously
B) Recovering passwords by trying every possible combination
C) Making electronic communications appear as if someone else sent them
D) Creating Internet Protocol packets with forged IP addresses
7.
MULTIPLE CHOICE QUESTION
10 sec • 6 pts
7. What is a dictionary attack primarily used for in the context of computer security?
A) Generating user IDs and password guesses using a dictionary of possible combinations to reduce the number of guesses required
B) Recovering passwords by trying every possible combination of upper- and lower-case letters, numbers, and special characters
C) Guessing e-mail addresses at a company and sending blank e-mail messages
D) Sending unsolicited messages to many people simultaneously
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
IGBAJO ND2 BUS ADMIN ASSESSMENT TEST

Quiz
•
University
15 questions
Chapter 11 - Switch Security Configuration

Quiz
•
University
12 questions
Hacking Scenarios

Quiz
•
University
10 questions
Types of Attack

Quiz
•
University
12 questions
Cyber 342W Trivia Part 2 Mod 1

Quiz
•
University
9 questions
Type of Attacks

Quiz
•
University
10 questions
CHAPTER 1: COMPUTER SECURITY REVIEW

Quiz
•
University
7 questions
Man in the Middle Attack

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade