Time limit: 0
Quiz-summary
0 of 8 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
Information
Introduction to Cybersecurity Chapter 2 Quiz Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 8 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- Answered
- Review
-
Question 1 of 8
1. Question
1 pointsIn what way are zombies used in security attacks?Correct
Incorrect
Hint
Zombies are infected computers that make up a botnet. The zombies are used to deploy a distributed denial of service (DDoS) attack. -
Question 2 of 8
2. Question
1 pointsWhich type of attack allows an attacker to use a brute force approach?Correct
Incorrect
Hint
Common ways used to crack Wi-Fi passwords include social engineering, brute-force attacks, and network sniffing. -
Question 3 of 8
3. Question
1 pointsWhich two characteristics describe a worm? (Choose two.)Correct
Incorrect
Hint
Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside. -
Question 4 of 8
4. Question
1 pointsWhat is the purpose of a rootkit?Correct
Incorrect
Hint
Malware can be classified as follows: – Virus (self replicates by attaching to another program or file) – Worm (replicates independently of another program) – Trojan Horse (masquerades as a legitimate file or program) – Rootkit (gains privileged access to a machine while concealing itself) – Spyware (collects information from a target system) – Adware (delivers advertisements with or without consent) – Bot (waits for commands from the hacker) – Ransomware (holds a computer system or data captive until payment is received)ent) -
Question 5 of 8
5. Question
1 pointsWhich tool is used to provide a list of open ports on network devices?Correct
Incorrect
Hint
The Nmap tool is a port scanner that is used to determine which ports are open on a particular network device. A port scanner is used before launching an attack. -
Question 6 of 8
6. Question
1 pointsWhat is the most common goal of search engine optimization (SEO) poisoning?Correct
Incorrect
Hint
A malicious user could create a SEO so that a malicious website appears higher in search results. The malicious website commonly contains malware or is used to obtain information via social engineering techniques. -
Question 7 of 8
7. Question
1 pointsWhich example illustrates how malware might be concealed?Correct
Incorrect
Hint
An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack. -
Question 8 of 8
8. Question
1 pointsWhat is the primary goal of a DoS attack?Correct
Incorrect
Hint
A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.