Attempt 1
Final Exam
Question 1 1 / 1 point
__________ is a worm for Windows XP that downloads and executes malicious
files on the compromised computer and spreads through removable storage
devices.
a. HTTP W32.Dro
...
Attempt 1
Final Exam
Question 1 1 / 1 point
__________ is a worm for Windows XP that downloads and executes malicious
files on the compromised computer and spreads through removable storage
devices.
a. HTTP W32.Drom
b. W32/VBAut-B
c. W32/QQRob-ADN
d. W32/SillyFDC-BK
View Feedback
Question 2 1 / 1 point
__________ monitors and audits databases for security issues in real time.
a. Selective
Audit
b. AppDetective
c. AppRadar
d. FlexTracer
View Feedback
Question 3 1 / 1 point
Which of the following attacks would you choose to seize control of a
legitimate user’s web application session while the session is still in progress?
a. session hijacking
b. DOS attack
c. password
sniffing
d. spoofing
View Feedback
Question 4 1 / 1 point
__________ viruses search all drives and connected network shares to locate
files with an EXE or SCR extension.
a. W32/MadangFamb. W32/Hasnot-A
c. W32/Fujacks-AK
d. W32/Fujacks-E
View Feedback
Question 5 1 / 1 point
In order for traffic to get back to the attacker during session hijacking, a
process called __________ is used that allows the sender to specify a particular
route for the IP packet to take to the destination.
a.
desynchronization
b. source routing
c. spoofing
d. TCP routing
View Feedback
Question 6 1 / 1 point
A __________ attack occurs when an attacker sends an oversized ping packet
to a victim’s device.
a. BlueSmacking
b. Blueprinting
c.
BTVoiceBugging
d. Bluesnarfing
View Feedback
Question 7 1 / 1 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server
regularly after connecting to it.
a. CheckOK
b.
SMTPCheck
c. SMTPMon
d. SLCheck
View FeedbackQuestion 8 1 / 1 point
Which of the following definitions best describes a wrapper?
a. A wrapper is a packet-crafting technique us
scans.
b. A wrapper is an encryption tool used to hid
c. A wrapper is a method of hiding a virus insi
d. A wrapper is a tool used to bind a Trojan to
View Feedback
Question 9 1 / 1 point
_________ hijacking is a hacking technique that uses spoofed packets to take
over a connection between a victim and a target machine.
a. ACK
b. Blind
c. TCP/IP
d. Networklevel
View Feedback
Question 10 1 / 1 point
Which of the following is not a Microsoft Internet Information Services
vulnerability?
a. ::$DATA vulnerability
b. UFS integer overflow
vulnerabilit
[Show More]