Cheat cheat finals - A(n blink requires user to transport...

This preview shows page 1 - 2 out of 3 pages.

A(n) blink requires user to transport it from one computer to another. Virus. Which of these NOT an action that a virus can take? Transport itself through the network to another device. Which malware locks up a user’s computer and then displays a message that purpose to come from law enforcement agency? Ransomwares. Which of the following is an attempt to influence a user by coercion? Intimidation. A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a blink. Trojan. What should you do to completely remove a rootkit from a computer? Reformat the hard drive and reinstall the OS. Which of these could NOT be defined as a logic bomb? Send spam email to all users in the company on Tuesday. What is it called when a user makes a typing error when entering a URL that takes him to an imposter website? Typo squatting. Which of these is a general term used for describing software that gathers information without the user’s consent? Spyware. Which statement regarding a keylogger is NOT true? Software keyloggers are easy to detect. The preferred method today of bot herders for command and control of zombies is blink. HTTP. A watering hole attack is directed against blink. Users who access a common website. Blink sends phishing messages only to wealthy individuals. Whaling. What is unsolicited instant messaging called? Spam. Michelle pretends to be the helpdesk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed? Impersonation. How can an attacker use a hoax? A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. Which of these items retrieved through dumpster diving would NOT provide useful information? Books. Blink is following an authorized person through a secure door. Tailgating. Each of these are a reason why adware is scorned EXEPT blink. It displays the attacker’s programming skills. What is the term used for an attacker who controls multiple zombies in a botnet? Bot herder. Which of these is NOT a reason why securing server-side web application is difficult? The processors o clients are smaller than on web servers and thus they are easier to defend. Which of these is not an HTTP header attack? Content-length. Which is another name for locally shared object? Flash Cookie. Browser plug-ins blink. Can be embedded inside a webpage but add-ons can’t. An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? Integer overflow. What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all thrust one another? Transitive. Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? Traditional network security devices ignore the content of HTTP traffic, which the vehicle of web application attacks. What do attackers use buffer overflows to do?
Image of page 1

Subscribe to view the full document.

Image of page 2
  • Winter '14
  • attack, mobile devices, web application server

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern