Chapter 4 example #6298

23 September 2023
5 (153 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
Which of the following describes advanced persistent threat (APT)?
answer
A network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The purpose of such an attack is to steal data, not to damage the network or organization.
question
Which term is used to describe a feature added to the NTFS file system to support files from POSIX, OS/2, and Macintosh?
answer
Alternate data stream (ADS)
question
Which name is given to an exploit that allows a hacker to run any command-line function on a compromised system?
answer
Arbitrary code execution
question
Which of the following us an intentional discharge made to damage or destroy electronic equipment ranging from cell phones to computers and servers?
answer
Intentional electromagnetic interference (IEMI)
question
Which of the following describes a banner?
answer
A message sent by a service in response to a valid or invalid query. Its function is to confirm communication is functioning properly or to announce an error.
question
Which of the following is not a type of malware?
answer
Chip creep
question
Which of the following refers to a logical division of data composed of one or more sectors on a hard drive?
answer
Cluster
question
What term is used to describe a tactic of pursuing and extracting information for the purpose of making a sale or performing a social engineering attack?
answer
Cold calling
question
Hackers can be deterred by defense methods that detect and evade. All of the following are defense methods, except which one?
answer
Botnet army
question
Which of the following is given to a software interface with a system that allows code execution?
answer
Command shell
question
Contract workers place a higher risk on the organization for all of the following reasons, except which one?
answer
They see the company as worthy of protection.
question
Which of the following describes covert channel?
answer
An unknown, secret pathway of communication.
question
Which of the following refers to the malicious insertion of scripting code onto a vulnerable Web site?
answer
Cross-site scripting (XSS)
question
Which term describes a form of security defense that focuses on discouraging a perpetrator with physical harm, social disgrace, and legal consequences?
answer
Deterrent
question
Which name is given to a rogue program that automatically dials a modem to a pre-defined number to auto-download additional malware to the victim or to upload stolen data from the victim?
answer
Dialer