Filters
Question type

Study Flashcards

An email that seems to come from the IT department requesting usernames and passwords is an example of what?


A) A Phishing Attack
B) A Questioning Attack
C) A Cloaking Attack
D) A Exploit Attack

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a major difference between a Worm and a Trojan horse?


A) Worms spread via e-mail, while Trojan horses don't.
B) Worms are a form of malicious code, whereas Trojan horses are not.
C) They are the same.
D) Worms self replicate, while Trojan horses don't.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

What is a way for a hacker to redirect someone to a bogus website by exploiting DNS server vulnerabilities?


A) Pharming
B) Phishing
C) Spam
D) Vishing

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following attacks involves the attacker gaining access to a host on the network and logically disconnecting it?


A) TCP/IP Hijacking
B) UDP Attack
C) ICMP Attacks
D) Smurf Attacks

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

John is investigating a situation where an internal user's PC has been hacked by another internal user in the organization. Which of the following locations should he check to determine the source of the attack?


A) The firewall's logs
B) Audit logs of the user who has attacked
C) Domain controller's logs
D) Audit logs of the user who has been attacked

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is the type of attack that gives the attacker the ability to see messages from both sides of the communication and can also interject other messages into the conversation as well?


A) Spoofing
B) DDoS
C) Replay
D) Man-in-the-Middle

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

You are working as a Security Advisor at your organization. On observing an employee's system log files report, you notice unsuccessful ongoing attempts to gain access to a single user account on the computer. What is this attack called?


A) TCP/IP hijacking
B) Password guessing attack
C) Man-in-the-middle attack
D) Worm attack

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

David is the Security Administrator at his organization. He is investigating an issue where the corporate server will not accept any connections using the TCP protocol. On close inspection he sees that the server indicates that it has exceeded its session limit. Which type of attack is this?


A) TCP ACK attack
B) TCP/IP hijacking
C) Smurf attack
D) Virus attack

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is a way of compromising the original software or application that can alter the logic of a XML Web page?


A) SQL Injection
B) LDAP Injection
C) XML Injection
D) Cross-site Scripting

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which protocol does the smurf attack use to attack a network or system?


A) TCP
B) IP
C) UDP
D) ICMP

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

David is concerned about the security of his organization's web server. He wants to find and block all open, vulnerable ports on his web server. Which of the following tools should he use to find all open ports on the network?


A) Firewall
B) Performance monitor
C) Network scanner
D) Protocol analyzer

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

David has just switched on his system and opened a word document. Surprisingly, the dialer started dialing the internet. What kind of an attack has probably occurred?


A) ACK attack
B) Worm
C) Logic bomb
D) Virus

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following defines a condition that can occur when an application receives more data than it is programmed to accept?


A) Spoofing
B) Buffer Overflow
C) Spam
D) Back door entry

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following logs should you look for if you want to find out when the workstation was last shutdown?


A) Hardware
B) Security
C) Access
D) System

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

John is a Security Administrator at his organization. He is observing repeated unsuccessful attempts from a hacker to submit a Kerberos certificate and have it be validated by the authentication system. What is this attack called?


A) Man-in-the-middle attack
B) Back door attack
C) Replay attack
D) TCP/IP hijacking

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

John is a security advisor at his organization. A number of anonymous users are complaining about data being stolen from their computers. Which of the following should he enforce to avoid data theft?


A) Multi factor authentication
B) Token authentication
C) Smart card authentication
D) No removable-media drives or ports on the computers policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 21 - 36 of 36

Related Exams

Show Answer