18 Questions
What is the method used by an attacker to gain access to private or confidential information over the telephone?
Pretexting
What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?
Pharming
What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?
Timing Attack
What is the goal of an attacker using pretexting?
To gain access to private or confidential information
What is the purpose of pharming?
To obtain private information
What is a critical component of system development?
Methodology
What is the approach to software development that involves creating systems with security objectives in mind?
Software Assurance
What type of security problem occurs when user input is passed directly to a compiler or interpreter?
Command Injection
What is the goal of an attacker using cross-site scripting?
To steal user data
What is the consequence of failure to handle errors in a program?
Unexpected system behaviors
What is the main cause of command injection problems?
Failure to validate user input
What is the primary objective of software assurance?
To create software that can be deployed in a secure fashion
What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?
Backdoor attack
What is the process of attempting to reverse-calculate a password?
Password Cracking
What is the term for the application of computing and network resources to try every possible password combination?
Brute Force Attack
What is the primary goal of a backdoor attack?
To gain unauthorized access to a system or network
What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?
Masked Attack
What is the purpose of a dictionary attack in the context of password cracking?
To use a list of words to try and guess a password
Test your knowledge on malicious attacks and cybersecurity threats, including social engineering tactics and phishing techniques, in the context of multimedia technologies.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free