Quiz I.T. Week 4

Quiz I.T. Week 4
29問 • 2年前
  • nicollette claire
  • 通報

    問題一覧

  • 1

    are related terms for individuals who have the skills to gain access to computer systems through unauthorized or unapproved means.

    Hackers and Attackers

  • 2

    neutral term for a user who excelled at computer programming and computer system administration.

    Hacker

  • 3

    always represents a malicious system intruder.

    Attacker

  • 4

    acker who discovers and exposes security flaws in applications and operating systems so that manufacturers can fix them before they become widespread problems. It is sometimes called an ethical hack.

    White Hat

  • 5

    discovers and exposes security vulnerabilities for financial gain or for some malicious purpose.

    Black Hat

  • 6

    any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.

    Malware

  • 7

    piece of code that spreads from one computer to another by attaching itself to other files.

    Virus

  • 8

    piece of code that spreads from one computer to another on its own, not by attaching itself to another file.

    Worm

  • 9

    insidious type of malware that is itself a software attack and can pave the way for a number of other types of attacks.

    Trojan Horse

  • 10

    piece of code that sits dormant on a target computer until it is triggered by a specific event, such as a specific date.

    Logic Bomb

  • 11

    Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or to collect other data the author wishes to obtain. Data collected can include web browsing history; personal information; banking and other financial information; as well as usernames and passwords.

    Spyware

  • 12

    Software that automatically displays or downloads advertisements when it is used.

    Adware

  • 13

    Code that is intended to take full or partial control of a system at the lowest levels.

    Rootkit

  • 14

    email-based threat that presents various advertising materials, promotional content, or get- rich-quick schemes to users.

    SPAM

  • 15

    malicious software that prevents you from using your computer. It usually displays a message stating that you must pay a fee or face some other penalty before you can access your files and computer again.

    Ransomware

  • 16

    human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.

    Shoulder Surfing

  • 17

    human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment.

    Spoofing

  • 18

    human-based attack where an attacker pretends to be someone he is not.

    Impersonation

  • 19

    This is an email-based or web-based attack that is intended to trick the user into performing undesired actions, such as deleting important system files in an attempt to remove a virus.

    Hoax

  • 20

    Thisisacommontypeofemail-basedsocialengineeringattack. theattackersends an email that seems to come from a respected bank or other financial institution.

    Phishing

  • 21

    This is a human-based attack where the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system and IP-based voice messaging services (Voice over Internet Protocol [VoIP]) as the communication medium. Voice Phishing

    Vishing

  • 22

    form of phishing that targets individuals who are known to possess a good deal of wealth. It is also known as spear phishing.

    Whaling

  • 23

    an Internet messaging (IM)-based attack similar to spam that is propagated through IM instead of through email.

    SPIM

  • 24

    Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.

    Password Cracking

  • 25

    simplest type of password attack and involves an individual making repeated attempts to guess a password by entering different common password values, such as the user’s name, a spouse’s name, or a significant date.

    Guessing

  • 26

    Passwords can be stolen by various means, including sniffing network communications, reading handwritten password notes, or observing a user in the act of entering the password.

    Stealing

  • 27

    automates password guessing by comparing encrypted passwords against a predetermined list of possible password values.

    Dictionary Attack

  • 28

    attacker uses password-cracking software to attempt every possible alphanumeric password combination.

    Brute Force Attack

  • 29

    utilizes multiple attack vectors including dictionary, brute-force, and other attack methodologies when trying to crack a password.

    Hybrid Password Attack

  • Quiz I.T Week 3

    Quiz I.T Week 3

    nicollette claire · 34問 · 2年前

    Quiz I.T Week 3

    Quiz I.T Week 3

    34問 • 2年前
    nicollette claire

    Quiz I.T. Week 5

    Quiz I.T. Week 5

    nicollette claire · 7問 · 2年前

    Quiz I.T. Week 5

    Quiz I.T. Week 5

    7問 • 2年前
    nicollette claire

    midterm exam FAR

    midterm exam FAR

    nicollette claire · 40問 · 2年前

    midterm exam FAR

    midterm exam FAR

    40問 • 2年前
    nicollette claire

    midterm qui

    midterm qui

    nicollette claire · 20問 · 2年前

    midterm qui

    midterm qui

    20問 • 2年前
    nicollette claire

    CFAS CHAPTER 1

    CFAS CHAPTER 1

    nicollette claire · 41問 · 2年前

    CFAS CHAPTER 1

    CFAS CHAPTER 1

    41問 • 2年前
    nicollette claire

    CFAS CHAPTER 2

    CFAS CHAPTER 2

    nicollette claire · 28問 · 2年前

    CFAS CHAPTER 2

    CFAS CHAPTER 2

    28問 • 2年前
    nicollette claire

    CFAS CHAPTER 3

    CFAS CHAPTER 3

    nicollette claire · 9問 · 2年前

    CFAS CHAPTER 3

    CFAS CHAPTER 3

    9問 • 2年前
    nicollette claire

    I.T FINALS R3VIEWER EXCEL 1

    I.T FINALS R3VIEWER EXCEL 1

    nicollette claire · 35問 · 2年前

    I.T FINALS R3VIEWER EXCEL 1

    I.T FINALS R3VIEWER EXCEL 1

    35問 • 2年前
    nicollette claire

    I.T FINALS REVIEWER SORTING DATA

    I.T FINALS REVIEWER SORTING DATA

    nicollette claire · 20問 · 2年前

    I.T FINALS REVIEWER SORTING DATA

    I.T FINALS REVIEWER SORTING DATA

    20問 • 2年前
    nicollette claire

    I.T REGIEWER VLOOKUP

    I.T REGIEWER VLOOKUP

    nicollette claire · 9問 · 2年前

    I.T REGIEWER VLOOKUP

    I.T REGIEWER VLOOKUP

    9問 • 2年前
    nicollette claire

    chapter 4

    chapter 4

    nicollette claire · 30問 · 1年前

    chapter 4

    chapter 4

    30問 • 1年前
    nicollette claire

    chapter 5

    chapter 5

    nicollette claire · 10問 · 1年前

    chapter 5

    chapter 5

    10問 • 1年前
    nicollette claire

    Chapter 6

    Chapter 6

    nicollette claire · 20問 · 1年前

    Chapter 6

    Chapter 6

    20問 • 1年前
    nicollette claire

    chapter 7

    chapter 7

    nicollette claire · 15問 · 1年前

    chapter 7

    chapter 7

    15問 • 1年前
    nicollette claire

    chapter 9

    chapter 9

    nicollette claire · 10問 · 1年前

    chapter 9

    chapter 9

    10問 • 1年前
    nicollette claire

    Chapter 14

    Chapter 14

    nicollette claire · 5問 · 1年前

    Chapter 14

    Chapter 14

    5問 • 1年前
    nicollette claire

    chapter 14

    chapter 14

    nicollette claire · 24問 · 1年前

    chapter 14

    chapter 14

    24問 • 1年前
    nicollette claire

    Chapter 16

    Chapter 16

    nicollette claire · 20問 · 1年前

    Chapter 16

    Chapter 16

    20問 • 1年前
    nicollette claire

    chapter 24

    chapter 24

    nicollette claire · 25問 · 1年前

    chapter 24

    chapter 24

    25問 • 1年前
    nicollette claire

    chapter 25

    chapter 25

    nicollette claire · 10問 · 1年前

    chapter 25

    chapter 25

    10問 • 1年前
    nicollette claire

    chapter 17

    chapter 17

    nicollette claire · 20問 · 1年前

    chapter 17

    chapter 17

    20問 • 1年前
    nicollette claire

    chapter 18

    chapter 18

    nicollette claire · 15問 · 1年前

    chapter 18

    chapter 18

    15問 • 1年前
    nicollette claire

    問題一覧

  • 1

    are related terms for individuals who have the skills to gain access to computer systems through unauthorized or unapproved means.

    Hackers and Attackers

  • 2

    neutral term for a user who excelled at computer programming and computer system administration.

    Hacker

  • 3

    always represents a malicious system intruder.

    Attacker

  • 4

    acker who discovers and exposes security flaws in applications and operating systems so that manufacturers can fix them before they become widespread problems. It is sometimes called an ethical hack.

    White Hat

  • 5

    discovers and exposes security vulnerabilities for financial gain or for some malicious purpose.

    Black Hat

  • 6

    any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.

    Malware

  • 7

    piece of code that spreads from one computer to another by attaching itself to other files.

    Virus

  • 8

    piece of code that spreads from one computer to another on its own, not by attaching itself to another file.

    Worm

  • 9

    insidious type of malware that is itself a software attack and can pave the way for a number of other types of attacks.

    Trojan Horse

  • 10

    piece of code that sits dormant on a target computer until it is triggered by a specific event, such as a specific date.

    Logic Bomb

  • 11

    Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or to collect other data the author wishes to obtain. Data collected can include web browsing history; personal information; banking and other financial information; as well as usernames and passwords.

    Spyware

  • 12

    Software that automatically displays or downloads advertisements when it is used.

    Adware

  • 13

    Code that is intended to take full or partial control of a system at the lowest levels.

    Rootkit

  • 14

    email-based threat that presents various advertising materials, promotional content, or get- rich-quick schemes to users.

    SPAM

  • 15

    malicious software that prevents you from using your computer. It usually displays a message stating that you must pay a fee or face some other penalty before you can access your files and computer again.

    Ransomware

  • 16

    human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.

    Shoulder Surfing

  • 17

    human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment.

    Spoofing

  • 18

    human-based attack where an attacker pretends to be someone he is not.

    Impersonation

  • 19

    This is an email-based or web-based attack that is intended to trick the user into performing undesired actions, such as deleting important system files in an attempt to remove a virus.

    Hoax

  • 20

    Thisisacommontypeofemail-basedsocialengineeringattack. theattackersends an email that seems to come from a respected bank or other financial institution.

    Phishing

  • 21

    This is a human-based attack where the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system and IP-based voice messaging services (Voice over Internet Protocol [VoIP]) as the communication medium. Voice Phishing

    Vishing

  • 22

    form of phishing that targets individuals who are known to possess a good deal of wealth. It is also known as spear phishing.

    Whaling

  • 23

    an Internet messaging (IM)-based attack similar to spam that is propagated through IM instead of through email.

    SPIM

  • 24

    Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.

    Password Cracking

  • 25

    simplest type of password attack and involves an individual making repeated attempts to guess a password by entering different common password values, such as the user’s name, a spouse’s name, or a significant date.

    Guessing

  • 26

    Passwords can be stolen by various means, including sniffing network communications, reading handwritten password notes, or observing a user in the act of entering the password.

    Stealing

  • 27

    automates password guessing by comparing encrypted passwords against a predetermined list of possible password values.

    Dictionary Attack

  • 28

    attacker uses password-cracking software to attempt every possible alphanumeric password combination.

    Brute Force Attack

  • 29

    utilizes multiple attack vectors including dictionary, brute-force, and other attack methodologies when trying to crack a password.

    Hybrid Password Attack