Deck 7: Digital Security

Full screen (f)
exit full mode
Question
​Android devices automatically encrypt data stored on the device when a user activates the login password.
Use Space or
up arrow
down arrow
to flip the card.
Question
​Which of the following is not an example of an authentication protocol?

A) ​password
B) ​PINs
C) ​fingerprint scanner
D) ​all of the above
Question
​Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

A) ​authentication
B) ​encryption
C) ​ciphertext
D) ​decryption
Question
​Password _________ is a measure in bits of a password's unpredictability.
Question
​It is not possible to encrypt a Windows hard drive volume.
Question
​There are various encryption methods, but __________ is the encryption standard currently used worldwide.

A) ​AES
B) ​DDoS
C) ​IMSI
D) ​TLS
Question
Brute force attacks methodically try every possible password until the correct one is found.​
Question
​Which of the following is not a characteristic of a weak password?

A) ​Eight characters in length and include one or more uppercase letters, numbers, and symbols.
B) ​Uses default passwords such as password, admin, system, and guest.
C) ​Any sequence that includes a user name.
D) ​Use of words from a dictionary.
Question
​If you want to store passwords on your digital device, make sure to _________ the file in which they are stored.
Question
​Passwords used as encryption ________ help to make hijacked data unusable.
Question
​Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.

A) entropy​
B) ​massive
C) ​dictionary
D) ​brute force
Question
​A cryptographic __________ is a procedure for encryption or decryption.

A) ​firewall
B) ​ciphertext
C) ​key
D) ​algorithm
Question
​An original message or file that has not yet been encrypted is referred to as ciphertext.
Question
​Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.
Question
​The single most effective security measure for digital devices is to password protect access to them.
Question
​OS X devices include a utility that automatically encrypts data stored locally.
Question
A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.​
Question
​A(n) _______ password is difficult to hack.
Question
​Password entropy is a measure in _____ of a password's unpredictability.
Question
​If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

A) ​keylogger
B) ​encryption key
C) ​password manager
D) ​personal firewall
Question
​A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves.
Question
Password managers store passwords in a(n) _________ file​
Question
​The action carried out by malware code is referred to as a(n) _______.
Question
​Password managers can generate unique passwords that have very good entropy.
Question
​A password manager can store passwords in an encrypted file located at which of the following storage locations?

A) ​ local storage
B) ​cloud storage
C) ​USB storage
D) ​all of the above
Question
​Stuxnet is a notorious computer _______.
Question
​ ________ refers to any computer program designed to surreptitiously enter a digital device.
Question
​Which of the following is not a characteristic of a computer worm?

A) ​self-replicating
B) ​usually standalone executable programs
C) ​self-distributing
D) ​spread through a process called side-loading
Question
​What is the process called when an app from a source other than an official app store is installed on a device?

A) ​Side-loading
B) ​Rootkit
C) ​Code injection
D) ​Dropper
Question
​In addition to replicating itself, a virus self-distributing.
Question
​Viruses spread themselves from one device to another.
Question
​Common classifications of _________ include viruses, worms, and trojans.
Question
​Most trojans are not designed to replicate themselves.
Question
​__________ is the process of modifying an executable file or data stream by adding additional commands

A) ​Keylogging
B) ​Pharming
C) ​Brute force attack
D) ​Code injection
Question
​Similar to a worm, a trojan is not designed to spread itself to other devices.
Question
​The core function of a password manager is to store user IDs with their corresponding ________.
Question
​A computer _______ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.
Question
​If you use a password manager, what do you as the user need to remember?

A) ​Your passwords for individual sites.
B) ​The master password.
C) ​Form data including credit card numbers.
D) ​All of the above
Question
​A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

A) trojan​
B) ​virus
C) ​worm
D) ​all of the above
Question
​Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
Question
​Which of the following sequence of events best describes an online intrusion?

A) ​Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
B) ​A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C) ​A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.
D) None of the above​
Question
​A(n) __________ is an undocumented method of accessing a digital device.
Question
​Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

A) ​heuristic analysis
B) ​virus signature
C) ​side-loading
D) ​port scan
Question
​Trojans depend on ________ to spread.

A) ​self-replication
B) ​social engineering
C) ​rootkits
D) ​code injection
Question
​The best defense against malware is _____________.

A) ​encryption
B) ​entropy
C) ​antivirus software
D) ​all of the above
Question
​Any data entering a digital device could be malware.
Question
​A(n) _________ is designed to deliver malicious code into a device.
Question
​Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
Question
​A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit.
Question
​RATs can be used to create a backdoor to a victim's device that takes control of the device's camera.
Question
​When antivirus software detects malware, which of the following would not be a course of action you could take?

A) ​Conduct a heuristic analysis.
B) ​Repair the infection.
C) ​Put the infected file into quarantine.
D) ​Delete the infected file.
Question
​Which type of device is the top target for ransomware?

A) ​Desktops
B) ​Laptops
C) ​Smartphones
D) ​All of the above
Question
​Once you have installed antivirus software, you don't typically need to keep it running full time in the background
Question
​A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

A) ​address spoofing
B) ​online intrusion
C) ​brute force attack
D) ​zero-day attack
Question
​__________ are standalone programs that masquerade as useful utilities or applications
Question
​A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

A) ​DDoS
B) ​TLS
C) ​PUP
D) ​RAT
Question
​A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus.

A) ​payload
B) ​signature
C) ​hoax
D) ​dropper
Question
​A(n) __________ is a computer program that seems to perform one function while actually doing something else.
Question
​One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________ .
Question
​If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utilities is turned off.
Question
​ A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

A) ​Netstat
B) ​firewall
C) ​Evil Twin
D) ​digital certificate
Question
​Which of the following would be considered spyware?

A) ​a keylogger
B) ​firewall software
C) ​Antivirus software
D) ​all of the above
Question
​__________ changes an originating address or a destination address to redirect the flow of data between two parties.

A) ​Social engineering
B) ​IMSI catching
C) ​Address spoofing
D) ​All of the above
Question
​A network utility called ______________ produces a detailed list of open ports on a device.
Question
​Correctly installed antivirus software will prevent all intrusions.
Question
​Antivirus software cannot be expected to block threats that do not arrive in the form of malware.
Question
​_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

A) ​Malware
B) ​Anti-exploit
C) ​Antivirus
D) ​Virus signature
Question
​ ___________ locks a device and then requests payment for an unlocking code.
Question
​Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

A) ​network router
B) ​personal firewall
C) ​hardware that uses a NAT
D) ​all of the above
Question
​Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.
Question
​To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

A) ​Keylogger
B) ​Evil Twin
C) ​botnet
D) ​None of the above
Question
​The objective of a MITM attack is for a third party to block communications between two entities.
Question
​Any software that secretly gathers personal information without the victim's knowledge is classified as __________.
Question
​MITM attacks include which of the following?

A) ​Address spoofing
B) ​IMSI catchers
C) ​Evil Twins
D) ​all of the above
Question
​_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

A) ​DDoS
B) ​Botnets
C) ​Commands from a botmaster
D) ​All of the above
Question
​A(n) _____________ is a LAN server that is designed to look like a legitimate Wi-Fi hotspot.
Question
​Hackers can use ports to communicate with devices in botnets.
Question
​A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

A) zero-day​
B) ​rootkit
C) ​brute force
D) ​dictionary
Question
​A(n) __________ pings a packet of data to a port in order to see if that port is open or not.

A) ​rootkit
B) ​port scan
C) ​virus signature
D) ​heuristic analysis
Question
​A botnet has a server that is controlled by hackers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/106
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Digital Security
1
​Android devices automatically encrypt data stored on the device when a user activates the login password.
False
2
​Which of the following is not an example of an authentication protocol?

A) ​password
B) ​PINs
C) ​fingerprint scanner
D) ​all of the above
D
3
​Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

A) ​authentication
B) ​encryption
C) ​ciphertext
D) ​decryption
B
4
​Password _________ is a measure in bits of a password's unpredictability.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
5
​It is not possible to encrypt a Windows hard drive volume.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
6
​There are various encryption methods, but __________ is the encryption standard currently used worldwide.

A) ​AES
B) ​DDoS
C) ​IMSI
D) ​TLS
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
7
Brute force attacks methodically try every possible password until the correct one is found.​
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
8
​Which of the following is not a characteristic of a weak password?

A) ​Eight characters in length and include one or more uppercase letters, numbers, and symbols.
B) ​Uses default passwords such as password, admin, system, and guest.
C) ​Any sequence that includes a user name.
D) ​Use of words from a dictionary.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
9
​If you want to store passwords on your digital device, make sure to _________ the file in which they are stored.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
10
​Passwords used as encryption ________ help to make hijacked data unusable.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
11
​Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.

A) entropy​
B) ​massive
C) ​dictionary
D) ​brute force
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
12
​A cryptographic __________ is a procedure for encryption or decryption.

A) ​firewall
B) ​ciphertext
C) ​key
D) ​algorithm
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
13
​An original message or file that has not yet been encrypted is referred to as ciphertext.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
14
​Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
15
​The single most effective security measure for digital devices is to password protect access to them.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
16
​OS X devices include a utility that automatically encrypts data stored locally.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
17
A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.​
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
18
​A(n) _______ password is difficult to hack.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
19
​Password entropy is a measure in _____ of a password's unpredictability.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
20
​If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

A) ​keylogger
B) ​encryption key
C) ​password manager
D) ​personal firewall
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
21
​A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
22
Password managers store passwords in a(n) _________ file​
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
23
​The action carried out by malware code is referred to as a(n) _______.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
24
​Password managers can generate unique passwords that have very good entropy.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
25
​A password manager can store passwords in an encrypted file located at which of the following storage locations?

A) ​ local storage
B) ​cloud storage
C) ​USB storage
D) ​all of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
26
​Stuxnet is a notorious computer _______.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
27
​ ________ refers to any computer program designed to surreptitiously enter a digital device.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
28
​Which of the following is not a characteristic of a computer worm?

A) ​self-replicating
B) ​usually standalone executable programs
C) ​self-distributing
D) ​spread through a process called side-loading
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
29
​What is the process called when an app from a source other than an official app store is installed on a device?

A) ​Side-loading
B) ​Rootkit
C) ​Code injection
D) ​Dropper
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
30
​In addition to replicating itself, a virus self-distributing.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
31
​Viruses spread themselves from one device to another.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
32
​Common classifications of _________ include viruses, worms, and trojans.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
33
​Most trojans are not designed to replicate themselves.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
34
​__________ is the process of modifying an executable file or data stream by adding additional commands

A) ​Keylogging
B) ​Pharming
C) ​Brute force attack
D) ​Code injection
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
35
​Similar to a worm, a trojan is not designed to spread itself to other devices.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
36
​The core function of a password manager is to store user IDs with their corresponding ________.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
37
​A computer _______ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
38
​If you use a password manager, what do you as the user need to remember?

A) ​Your passwords for individual sites.
B) ​The master password.
C) ​Form data including credit card numbers.
D) ​All of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
39
​A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

A) trojan​
B) ​virus
C) ​worm
D) ​all of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
40
​Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
41
​Which of the following sequence of events best describes an online intrusion?

A) ​Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
B) ​A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C) ​A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.
D) None of the above​
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
42
​A(n) __________ is an undocumented method of accessing a digital device.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
43
​Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

A) ​heuristic analysis
B) ​virus signature
C) ​side-loading
D) ​port scan
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
44
​Trojans depend on ________ to spread.

A) ​self-replication
B) ​social engineering
C) ​rootkits
D) ​code injection
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
45
​The best defense against malware is _____________.

A) ​encryption
B) ​entropy
C) ​antivirus software
D) ​all of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
46
​Any data entering a digital device could be malware.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
47
​A(n) _________ is designed to deliver malicious code into a device.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
48
​Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
49
​A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
50
​RATs can be used to create a backdoor to a victim's device that takes control of the device's camera.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
51
​When antivirus software detects malware, which of the following would not be a course of action you could take?

A) ​Conduct a heuristic analysis.
B) ​Repair the infection.
C) ​Put the infected file into quarantine.
D) ​Delete the infected file.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
52
​Which type of device is the top target for ransomware?

A) ​Desktops
B) ​Laptops
C) ​Smartphones
D) ​All of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
53
​Once you have installed antivirus software, you don't typically need to keep it running full time in the background
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
54
​A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

A) ​address spoofing
B) ​online intrusion
C) ​brute force attack
D) ​zero-day attack
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
55
​__________ are standalone programs that masquerade as useful utilities or applications
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
56
​A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

A) ​DDoS
B) ​TLS
C) ​PUP
D) ​RAT
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
57
​A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus.

A) ​payload
B) ​signature
C) ​hoax
D) ​dropper
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
58
​A(n) __________ is a computer program that seems to perform one function while actually doing something else.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
59
​One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________ .
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
60
​If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utilities is turned off.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
61
​ A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

A) ​Netstat
B) ​firewall
C) ​Evil Twin
D) ​digital certificate
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
62
​Which of the following would be considered spyware?

A) ​a keylogger
B) ​firewall software
C) ​Antivirus software
D) ​all of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
63
​__________ changes an originating address or a destination address to redirect the flow of data between two parties.

A) ​Social engineering
B) ​IMSI catching
C) ​Address spoofing
D) ​All of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
64
​A network utility called ______________ produces a detailed list of open ports on a device.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
65
​Correctly installed antivirus software will prevent all intrusions.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
66
​Antivirus software cannot be expected to block threats that do not arrive in the form of malware.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
67
​_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

A) ​Malware
B) ​Anti-exploit
C) ​Antivirus
D) ​Virus signature
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
68
​ ___________ locks a device and then requests payment for an unlocking code.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
69
​Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

A) ​network router
B) ​personal firewall
C) ​hardware that uses a NAT
D) ​all of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
70
​Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
71
​To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

A) ​Keylogger
B) ​Evil Twin
C) ​botnet
D) ​None of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
72
​The objective of a MITM attack is for a third party to block communications between two entities.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
73
​Any software that secretly gathers personal information without the victim's knowledge is classified as __________.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
74
​MITM attacks include which of the following?

A) ​Address spoofing
B) ​IMSI catchers
C) ​Evil Twins
D) ​all of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
75
​_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

A) ​DDoS
B) ​Botnets
C) ​Commands from a botmaster
D) ​All of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
76
​A(n) _____________ is a LAN server that is designed to look like a legitimate Wi-Fi hotspot.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
77
​Hackers can use ports to communicate with devices in botnets.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
78
​A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

A) zero-day​
B) ​rootkit
C) ​brute force
D) ​dictionary
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
79
​A(n) __________ pings a packet of data to a port in order to see if that port is open or not.

A) ​rootkit
B) ​port scan
C) ​virus signature
D) ​heuristic analysis
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
80
​A botnet has a server that is controlled by hackers.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 106 flashcards in this deck.