SEC280 Quiz Week 6

$4.00

SEC280 Quiz Week 6
(TCO 3) An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is c…

SKU: SEC 280 Quiz Week 6 Categories: , Tags: , , ,

Description

SEC280 Quiz Week 6

SEC280 Quiz Week 6

A+

(TCO 3) An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a _____ attack.

Smurf

Denial-of-service

Viral

Replay

(TCO 3) The art of “secret writing” is called _____.

Spoofing

Smurfing

Cryptography

Cryptanalysis

(TCO 3) Making data look like they came from a different source is called _____.

Sniffing

A man-in-the-middle attack

A replay attack

Spoofing

(TCO 5) Malicious code that is scripted to send itself to other users is known as a _____.

Virus

Worm

Trojan

Logic bomb

(TCO 5) What is the primary reason for the spread of the ILOVEYOU worm?

Network firewalls failed

Systems did not have the appropriate software patch

Automatic execution, such as Microsoft Outlook’s preview pane

The virus-scan software was not updated

 (TCO 5) Which of the following is not one of the three primary e-mail protocols?

SMTP

SNMP

POP3

IMAP

(TCO 5) A worm is a type of virus that _____.

Is scripted to send itself to other systems

Is designed to crawl in under a firewall

Buries itself between the kernel and the Application Layer of the operating system

Is passed through e-mails with a subject heading that has the word “worm” in it

(TCO 6) ActiveX refers to a _____.

Collection of APIs, protocols, and programs developed by Microsoft to automatically download and execute code over the Internet

Library of security protocols for Microsoft’s Internet Explorer

Patch to fix a vulnerability that hackers exploit where the user downloads an MP3 file and the buffers of the sound card are overwritten

Method of blocking java scripts that come from non-Microsoft websites

(TCO 6) With the RSA and Diffie-Hellman handshakes, _____.

The server and the client agree on what type of browser to use

Parameters are agreed upon and certificates and keys are exchanged

Parameters are agreed upon so that java scripts cannot execute inside the client system

Office applications are able to e-mail secure documents

(TCO 6) Which are the most common exploits used to hack into a system?

Buffer overflows

Birthday attacks

Weak-key attacks

Man-in-the-middle attacks