13.3.9

25 December 2023
4.7 (233 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
Which of the following statements about the use of anti-virus software is correct?
answer
Anti-virus software should be configured to download updated virus definition files as soon as they become available.
question
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
answer
DDoS
question
Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?
answer
Smurf
question
An attacker captures packets as they travel from one host to another with the intent of altering the contents of the packets. Which type of attack is being executed?
answer
Man-in-the-middle attack
question
Which option is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously?
answer
Trojan horse
question
Which type of activity changes or falsifies information in order to mislead or re-direct traffic?
answer
Spoofing
question
An attacker sends an unwanted and unsolicited email message to multiple recipients with an attachment that contains malware. What kind of attack has occurred in this scenario?
answer
Spam
question
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario? (Select two. Both responses are different names for the same exploit.)
answer
1) DNS poisoning 2) Pharming
question
A programmer that fails to check the length of input before processing leaves his code vulnerable to what form of common attack?
answer
Buffer overflow
question
You have installed anti-malware software that checks for viruses in email attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file?
answer
It has been moved to a secure folder on your computer.
question
If your anti-virus software does not detect and remove a virus, what should you try first?
answer
Update your virus detection software.
question
Which of the following measures are you most likely to implement to protect a system from a worm or Trojan horse?
answer
Antivirus software
question
To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?
answer
Configure the software to automatically download the virus definition files as soon as they become available.
question
You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day. What else should you do to protect your systems from malware? (Select two.)
answer
Schedule regular full system scans. Educate users about malware.
question
While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed. Which type of attack has likely occurred?
answer
DNS poisoning