_ has the ability to morph or mutate when it replicates itself, or when it executes making it difficult for antivirus software to track/find.
Amphibious Virus
Logic Malware
Armored Virus
Polymorphic Malware
2. Multiple Choice
1 minute
1 pt
Which of the following is a group of programs (or, in rare instances, a single program) that hides the fact that the system has been infected or compromised by malicious code and has system-level access.
Faux-Admin Viruses
Rootkits
BIOS Worms
Botnets
3. Multiple Choice
1 minute
1 pt
An attack in the form of active interception or active eavesdropping where the attacker inserts themselves in the middle of two systems that are communicating.
Center-Seat
Man-in-the-Middle
Phising
SQL Injection
4. Multiple Choice
1 minute
1 pt
_ attempts to create a numeric value that is too big for an application to handle resulting in that application into giving inaccurate results; presents a security concern.
Integer Overflow
SQL Injection
Arbitrary Code Execution
ANV Poisoning
5. Multiple Choice
1 minute
1 pt
Bluejacking
is the practice of sending unsolicited messages to nearby Bluetooth devices.
is the process of acquiring sensitive information from the Bluetooth enabled device.
the act of enabling or installing Bluetooth on a otherwise incompatible device.
is when an attacker will steal the power and channel from a Bluetooth connection to speed up their own.
6. Multiple Choice
1 minute
1 pt
Which attack spoofs the source address of a directed broadcast ping packet to flood a victim with ping replies?
SYN Flood
Smurf
Man-in-the-Middle
SPIM
7. Multiple Choice
1 minute
1 pt
The password attack that involves using password-cracking software to mathematically calculate every possible password is would BEST be known as?
Dictionary Attack
Birthday Attack
Brute-Force Attack
UAP Flood Attack
8. Multiple Choice
1 minute
1 pt
_ refers to the method where huge databases of precomputed hashes are used to speed up the process of performing a password attack.
Rainbow Tables
Birthday Rounds
Dictionary Hoarding
Buffer Overflows
9. Multiple Choice
1 minute
1 pt
When a hacker compromises a DNS server and poisons the DNS entries by having the DNS names point to incorrect IP addresses is what type of attack?
Poisoning
Spear Phishing
Birthday
Relay
10. Multiple Choice
1 minute
1 pt
Vulnerability scans attempt to determine if a vulnerability exists, but it does not try to exploit the vulnerability. Which of following BEST describes this?
Intrusive
Non-Intrusive
Active
Severe-Impact
11. Multiple Choice
1 minute
1 pt
A _ is a text file stored on a user’s computer and used for multiple purposes, including tracking a user’s activity.
Adware
Cookie
XML
Captive Document
12. Multiple Choice
1 minute
1 pt
A system that is placed on the private network, or in a DMZ, designed to lure the hacker away from production systems and to it instead is know as?
Honeypot
Switch
ServerNet
PoC
13. Multiple Choice
1 minute
1 pt
What vulnerability assessment has developers go line-by-line through the code and to help detect vulnerabilities, such as race conditions or susceptibility to buffer overflow attacks?
Sandboxing
Code Review
Log Auditing
Application Design Review
14. Multiple Choice
1 minute
1 pt
SQL injection attacks are a type of _ attack performed from the client side using a web browser which can allow unauthorized personnel to access restricted data.
Man-in-the-Middle
smurf
transitive access
command manipulation
15. Multiple Choice
1 minute
1 pt
Which type of attack involves the hacker inserting malicious HTML or JavaScript code into a form on a web page and submitting the code to the server in efforts to gain information about a user?