code attack includes the execution of viruses worms Trojan horses and active

Code attack includes the execution of viruses worms

This preview shows page 1 - 4 out of 5 pages.

code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________ Selected Answer: Tru e
Image of page 1
Answers: Tru e False Question 5 1 out of 1 points One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. Selected Answer: c. hacktivist Answers: a. cyberhack b. phreak c. hacktivist d. hackcyber Question 6 0 out of 1 points A mail bomb is a form of DoS attack. Selected Answer: Fals e Answers: Tru e False Question 7 1 out of 1 points Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems. Selected Answer: Tru e Answers: Tru e False Question 8 1 out of 1 points The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. Selected Answer: a. TCP Answers: a. TCP
Image of page 2
b. FTP c. WWW d. HTTP Question 9 0 out of 1 points The ____________________ data file contains the hashed representation of the user’s password. Selected Answer: b. SLA Answers: a. FBI b. SLA c. SAM d. SNMP Question 10 1 out of 1 points Hackers can be generalized into two skill groups: expert and ____________________. Selected Answer: c. novice Answers: a. professional b. journeyman c.
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 5 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture