Introduction to Cybersecurity 2.1 Chapter 2 Quiz Simulator Online
ITC 2.1 Chapter 2 Quiz Simulator Online | |
---|---|
Time | 60 minutes |
Questions | 8 |
SHOW ANSWERS |
Leaderboard: ITC v2.1 Chapter 2 Quiz Simulator
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
ITC v2.1 Chapter 2 Quiz Simulator
Quiz-summary
0 of 8 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
Information
ITC v2.1 Chapter 2 Quiz Simulator
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 8 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- Answered
- Review
-
Question 1 of 8
1. Question
2 pointsWhich two characteristics describe a worm? (Choose two.)
Correct
Incorrect
Hint
Explanation:
Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside.
-
Question 2 of 8
2. Question
1 pointsIn what way are zombies used in security attacks?
Correct
Incorrect
Hint
Explanation:
Zombies are infected computers that make up a botnet. The zombies are used to deploy a distributed denial of service (DDoS) attack.
-
Question 3 of 8
3. Question
1 pointsWhich tool is used to provide a list of open ports on network devices?
Correct
Incorrect
Hint
Explanation:
The Nmap tool is a port scanner that is used to determine which ports are open on a particular network device. A port scanner is used before launching an attack.
-
Question 4 of 8
4. Question
1 pointsWhich type of attack allows an attacker to use a brute force approach?
Correct
Incorrect
Hint
Explanation:
Common ways used to crack Wi-Fi passwords include social engineering, brute-force attacks, and network sniffing.
-
Question 5 of 8
5. Question
1 pointsWhat is the primary goal of a DoS attack?
Correct
Incorrect
Hint
Explanation:
A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.
-
Question 6 of 8
6. Question
1 pointsWhat is the purpose of a rootkit?
Correct
Incorrect
Hint
Explanation:
Malware can be classified as follows:
– Virus (self replicates by attaching to another program or file)
– Worm (replicates independently of another program)
– Trojan Horse (masquerades as a legitimate file or program)
– Rootkit (gains privileged access to a machine while concealing itself)
– Spyware (collects information from a target system)
– Adware (delivers advertisements with or without consent)
– Bot (waits for commands from the hacker)
– Ransomware (holds a computer system or data captive until payment is received)ent) -
Question 7 of 8
7. Question
1 pointsWhich example illustrates how malware might be concealed?
Correct
Incorrect
Hint
Explanation:
An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.
-
Question 8 of 8
8. Question
1 pointsWhat is the most common goal of search engine optimization (SEO) poisoning?
Correct
Incorrect
Hint
Explanation:
A malicious user could create a SEO so that a malicious website appears higher in search results. The malicious website commonly contains malware or is used to obtain information via social engineering techniques.