Question and Answer
Question and Answer
1.This malware is design to track and spy on the user. often includes activity trackers, keystroke
collection, and data capture.
ANSWER: D
a. Virus
b. Worms
c. Bot
d. Spyware
2. Malicious executable code that is attached to other executable files, often legitimate programs.
ANSWER: C
a. Trojan horse
b. Man-In-The-Middle (MitM)
c. Virus
d. Spyware
3. This vulnerability occurs when data is written beyond the limits of a buffer.
ANSWER: B
a. Non-validated input
b. Buffer overflow
c. Race conditions
d. Access-control problems
4. This vulnerability is when the output of an event depends on ordered or timed outputs.
ANSWER: A
a. Race conditions
b. Buffer overflow
c. Non-validated input
d. Access-control problems
5. This is when an attacker quickly follows an authorized person into a secure location.
ANSWER: B
b. Tailgating
c. Pretexting
6. This malware is designed to modify the operating system to create a backdoor. Attackers then use the
backdoor to access the computer remotely.
ANSWER: D
a. Trojan horse
b. Man-In-The-Middle (MitM)
c. Spyware
d. Rootkit
7. This is when an attacker requests personal information from a party in exchange for something, like a
free gift.
ANSWER: A
b. Tailgating
c. Pretexting
8. The attacker manipulates a person who knows the password into providing it.
ANSWER: C
a. Network sniffing
b. Brute-force attacks
c. Social engineering
9. The attacker tries several possible passwords in an attempt to guess the password.
ANSWER: B
a. Network sniffing
b. Brute-force attacks
c. Social engineering
10 . This is when a maliciously formatted packet is sent to a host or application and the receiver is
unable to handle it.
ANSWER: A
c. Network sniffing
TRUE OR FALSE
1. ________ Tailgating is when an attacker quickly follows an authorized person into a secure location.
ANSWER : TRUE
2. ________ Race conditions occurs when data is written beyond the limits of a buffer. Buffers are memory
areas allocated to an application.
ANSWER : FALSE
3. ________ are malicious code that replicate themselves by independently exploiting vulnerabilities in
networks.
ANSWER : FALSE
4. ________ Ransomware is designed to hold a computer system or the data it contains captive
until a payment is made.
ANSWER : TRUE
5. _________ Bot is a type of malware designed to persuade the user to take a specific action based on fear.
ANSWER : FALSE
6. ________ Blended attacks are attacks that use multiple techniques to compromise a target.
ANSWER : TRUE
7. ________ Denial-of-Service (DoS) A DoS attack results in some sort of interruption of network service to
users, devices, or applications.
ANSWER : TRUE
8. ________ DoS attacks are considered a minor risk because they cannot easily interrupt communication
and takes time to cause significant loss of time and money.
ANSWER : FALSE
9. ________ Phishing is when a malicious party sends a fraudulent email disguised as being from a
legitimate, trusted source.
ANSWER : TRUE
10. ________ a malicious user could use SEO to make a malicious website appear higher in search results.
This technique is called SEO poisoning.
ANSWER : TRUE
IDENTIFICATIONS
1. ______ type of attack used to take control over a mobile device. When infected, the mobile device can be
instructed to exfiltrate user-sensitive information and send it to the attackers.
ANSWER : Man-In-The-Mobile (MitMo)
2. ______usually introduced by errors in the operating system or application code.
ANSWER : Software vulnerabilities
3. ______ Systems and sensitive data can be protected through techniques such as authentication,
authorization, and encryption.
ANSWER : Weaknesses in security practices
4. ______ are often introduced by hardware design flaws.
ANSWER : Hardware vulnerabilities
5. ______ This is when an attacker requests personal information from a party in exchange for something.
ANSWER : Something for Something
6. ______ The attacker manipulates a person who knows the password into providing it.
ANSWER : Social engineering
7. ______ similar to a DoS attack but originates from multiple
ANSWER : Distributed DoS Attack (DDoS)
8. _____ This is when a network, host, or application is sent an enormous quantity of data at a rate which it
cannot handle.
ANSWER : Overwhelming Quantity of Traffic
9. _____ is an access attack that attempts to manipulate individuals into performing actions or divulging
confidential information.
ANSWER : Social engineering
10. _____ are any kind of software or hardware defect
11. ANSWER : Security vulnerabilities