Attacks, Concepts and Techniques Flashcards
Which of the following examples illustrates how malware might be concealed?
a) An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors
b) An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
c) A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site
d) A botnet of zombies carry personal information back to the hacker
(b)
Which of the following characteristics describe a worm?
Select two correct answers
(a) Infects computers by attaching to software code
(b) Hides in a dormant state until needed by an attacker
(c) Executes when software is run on a computer
(d) Is self-replicating
(e) Travels to new computers without any intervention or knowledge of the user
It is self-replicating and Travels to new computers without any intervention or knowledge of the user
What is the primary goal of a DoS attack?
(a) To obtain all addresses in the address book within the server
(b) To facilitate access to external networks
(c) To prevent the target server from being able to handle additional requests
(d) To scan the data on the target server
To prevent the target server from being able to handle additional requests
What type of attack allows an attacker to use a brute-force approach?
(a) Social engineering
(b) Denial of service
(c) Packet sniffing
(d) Password cracking
Password cracking
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?
(a) A fix
(b) A patch
(c) An install
(d) A hack
A patch
Which of the following should be carried out to address known software vulnerabilities of a specific application?
(a) Remove the application
(b) Install a security patch
(c) Change the hardware
(d) Change the software
Install a security patch
What is a Buffer overflow vulnerability?
Occurs when data is written beyond the limits of memory areas that are allocated to an application
What is a Race condition vulnerability?
Occurs when an ordered or timed set of processes is disrupted or altered by an exploit
What is an access control vulnerability?
Occurs through the improper use of practices that manage equipment, data or applications
Where is cryptocurrency stored?
(a) In a wallet
(b) On an exchange
(c) In a bank account
(d) On the blockchain