Time limit: 0
Quiz-summary
0 of 11 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
Information
Introduction to Cybersecurity Module 2 Quiz Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 11 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- Answered
- Review
-
Question 1 of 11
1. Question
1 pointsWhich of the following examples illustrates how malware might be concealed?Correct
Incorrect
Hint
A bot computer is typically infected by visiting an unsafe website or opening an infected email attachment or infected media file. -
Question 2 of 11
2. Question
1 pointsWhat is the purpose of a rootkit?Correct
Incorrect
Hint
Most rootkits take advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files. -
Question 3 of 11
3. Question
1 pointsWhat type of attack allows an attacker to use a brute-force approach?Correct
Incorrect
-
Question 4 of 11
4. Question
1 pointsWhat is the most common goal of search engine optimization (SEO) poisoning?Correct
Incorrect
Hint
The most common goal of SEO poisoning is to increase traffic to malicious sites that may host malware or attempt social engineering. -
Question 5 of 11
5. Question
1 pointsWhat do you call a program written to take advantage of a known security vulnerability?Correct
Incorrect
-
Question 6 of 11
6. Question
1 pointsWhich of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?Correct
Incorrect
Hint
Programs often require data input, but this incoming data could have malicious content, designed to force the program to behave in an unintended way. -
Question 7 of 11
7. Question
1 pointsA set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?Correct
Incorrect
-
Question 8 of 11
8. Question
1 pointsCan you identify the software vulnerability from the following descriptions?Correct
Incorrect
-
Question 9 of 11
9. Question
1 pointsWhat is a miner?Correct
Incorrect
-
Question 10 of 11
10. Question
1 pointsWhat is the primary goal of a DoS attack?Correct
Incorrect
-
Question 11 of 11
11. Question
1 pointsWhich of the following should be carried out to address known software vulnerabilities of a specific application?Correct
Incorrect
Hint
A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.