CTN277

Is this your test? Login to manage it. If not, you can create an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
2.
1 point
Successful attacks on computers today generally consist of two elements.
3.
1 point
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
4.
1 point
Which of the following is not one of the four methods for classifying the various types of malware?​
5.
1 point
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
6.
1 point
HTML uses which option below within embedded brackets (< >) causing a web browser to display text in a specific format?
7.
1 point
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
8.
1 point
What type of malware is heavily dependent on a user in order to spread?
9.
1 point
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​
10.
1 point
Choose the SQL injection statement example below that could be used to find specific users:
11.
1 point
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:
12.
1 point
To what specific directory are users generally restricted to on a web server?
13.
1 point
What country is now the number one source of attack traffic?
14.
1 point
Which term below is used to describe the tasks of protecting resources stored in a digital format?
15.
1 point
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
16.
1 point
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?​
17.
1 point
Select below the string of characters that can be used to traverse up one directory level from the root directory:
18.
1 point
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
19.
1 point
Today's software attack tools do not require that the attacker be a sophisticated computer user.
20.
1 point
Because of the minor role it plays, DNS is never the focus of attacks.
21.
1 point
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?
22.
1 point
What language below is used to view and manipulate data that is stored in a relational database?
23.
1 point
Which type of attack below is similar to a passive man-in-the-middle attack?
24.
1 point
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:
25.
1 point
What type of theft involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
26.
1 point
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
27.
1 point
​What type of system security malware allows for access to a computer, program, or service without authorization?
28.
1 point
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
29.
1 point
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​
30.
1 point
Security is the goal to be free from danger as well as the process that achieves that freedom.
31.
1 point
A macro virus takes advantage of the “____________________” relationship between the application and the operating system.
32.
1 point
What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted?
33.
1 point
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
34.
1 point
Attacks that take place against web based services are considered to be what type of attack?
35.
1 point
What language below is for the transport and storage of data, with the focus on what the data is?
36.
1 point
The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?
37.
1 point
Which of the following is not a category for mutating malware?​
38.
1 point
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?
39.
1 point
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?​
40.
1 point
XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.​
41.
1 point
The demand for certified IT professionals who know how to secure networks and computers is at an all-time low.
42.
1 point
Computer code that is added to a program but lies dormant until it is triggered by a specific event or series of events is known as a?
43.
1 point
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
44.
1 point
CGI attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.​
45.
1 point
An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user’s knowledge or permission.
46.
1 point
The default root directory of the Microsoft Internet Information Services (IIS) Web server is located at which directory below?
47.
1 point
An _______________ is a type of threat that can come from employees, contractors, and business partners, such as a disgruntled worker.​
48.
1 point
ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.
49.
1 point
A web browser makes a request for a web page using the
50.
1 point
What are the three protections that must be extended over information that provides value to people and organizations?