TCP/IP Quizzes

10 July 2024
4.6 (44 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
Script kiddies acquire which item below from other attackers to easily craft an attack:
answer
Exploit kit
question
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
answer
Love Bug
question
Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
answer
HIPAA
question
What country is now the number one source of attack traffic?
answer
Indonesia
question
Which term below is frequently used to describe the tasks of securing information that is in a digital format?
answer
information security
question
Which position below is considered an entry-level position for a person who has the necessary technical skills?
answer
security technician
question
In information security, an example of a threat agent can be ________.
answer
a force of nature such as a tornado that could destroy computer equipment a virus that attacks a computer network A person attempting to break into a secure computer network
question
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
answer
remote
question
In information security, what constitutes a loss?
answer
theft of information a delay in transmitting information that results in a financial penalty the loss of good will or a reputation
question
Select below the term that is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so:
answer
Script kiddies
question
Which of the following is not one of the four methods for classifying the various types of malware?
answer
​Source
question
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
answer
A macro
question
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?​
answer
Oligomorphic malware
question
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
answer
rootkit
question
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
answer
Easter egg
question
What type of malware is heavily dependent on a user in order to spread?
answer
virus
question
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
answer
Social engineering
question
What is the term used to describe unsolicited messages received on instant messaging software?
answer
​Spim
question
A virus that infects an executable program file is known as?
answer
program virus
question
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?
answer
logic bomb