Created by
Terms in this set (12)
Which two statements describe access attacks? (Choose two.)
Port rediretction attacks use a network adapter card in promiscuous mode to capture all network packets that are being sent across a LAN.
To detect listening services, port scanning attacks scan a range of TCP or UDP port numbers on a host.
Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execute malicious code.
Password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers.
Trust exploitation attacks often involve the use of a laptop to act as a rogue access point to capture and copy all network traffic in a public location, such as a wireless hotspot.
Port rediretction attacks use a network adapter card in promiscuous mode to capture all network packets that are being sent across a LAN.
To detect listening services, port scanning attacks scan a range of TCP or UDP port numbers on a host.
Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execute malicious code.
Password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers.
Trust exploitation attacks often involve the use of a laptop to act as a rogue access point to capture and copy all network traffic in a public location, such as a wireless hotspot.
Which two characteristics describe a worm? (Choose two.)
executes when software is run on a computer
infects computers by attaching software code
travels to new computers without any intervention or knowledge of the user
hides in a dormant state until needed by an attacker
is self-replicating
despite being hermaphroditic, it needs a partner to reproduce
executes when software is run on a computer
infects computers by attaching software code
travels to new computers without any intervention or knowledge of the user
hides in a dormant state until needed by an attacker
is self-replicating
despite being hermaphroditic, it needs a partner to reproduce
In what way are zombies used in security attacks?
They probe a group of machine for open ports to learn which services are running.
They are malicioulsy formed code segments used to replace legitimate applications.
They are infected machines that carry out a DDoS attack.
They target specific individuals to gain corporate information.
They target specific individuals to gain personal information.
They probe a group of machine for open ports to learn which services are running.
They are malicioulsy formed code segments used to replace legitimate applications.
They are infected machines that carry out a DDoS attack.
They target specific individuals to gain corporate information.
They target specific individuals to gain personal information.
What is an example of a local exploit?
A threat actor performs a brute force attack on an enterprise edge router to gain illegal access.
A buffer overflow attack is launched against an online shopping website and causes a server crash.
Port scanning is used to determine if the Telnet service is running.
The threat actor is within a 5 kilometer radius of the target.
A threat actor tries to gain the user password of a remote host by using a keyboard capture installed by a Trojan.
A threat actor performs a brute force attack on an enterprise edge router to gain illegal access.
A buffer overflow attack is launched against an online shopping website and causes a server crash.
Port scanning is used to determine if the Telnet service is running.
The threat actor is within a 5 kilometer radius of the target.
A threat actor tries to gain the user password of a remote host by using a keyboard capture installed by a Trojan.
Sets found in the same folder
Other sets by this creator
Other Quizlet sets
1/3