IT 306: Multimedia Technologies Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the method used by an attacker to gain access to private or confidential information over the telephone?

  • Timing Attack
  • Pretexting (correct)
  • Pharming
  • Trojan

What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?

  • Malware Attack
  • Phishing
  • Pharming (correct)
  • Trojan Attack

What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?

  • Pharming Attack
  • Malware Infection
  • Trojan Horse Attack
  • Timing Attack (correct)

What is the goal of an attacker using pretexting?

<p>To gain access to private or confidential information (C)</p> Signup and view all the answers

What is the purpose of pharming?

<p>To obtain private information (A)</p> Signup and view all the answers

What is a critical component of system development?

<p>Methodology (A)</p> Signup and view all the answers

What is the approach to software development that involves creating systems with security objectives in mind?

<p>Software Assurance (B)</p> Signup and view all the answers

What type of security problem occurs when user input is passed directly to a compiler or interpreter?

<p>Command Injection (C)</p> Signup and view all the answers

What is the goal of an attacker using cross-site scripting?

<p>To steal user data (D)</p> Signup and view all the answers

What is the consequence of failure to handle errors in a program?

<p>Unexpected system behaviors (A)</p> Signup and view all the answers

What is the main cause of command injection problems?

<p>Failure to validate user input (B)</p> Signup and view all the answers

What is the primary objective of software assurance?

<p>To create software that can be deployed in a secure fashion (A)</p> Signup and view all the answers

What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?

<p>Backdoor attack (B)</p> Signup and view all the answers

What is the process of attempting to reverse-calculate a password?

<p>Password Cracking (A)</p> Signup and view all the answers

What is the term for the application of computing and network resources to try every possible password combination?

<p>Brute Force Attack (A)</p> Signup and view all the answers

What is the primary goal of a backdoor attack?

<p>To gain unauthorized access to a system or network (C)</p> Signup and view all the answers

What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?

<p>Masked Attack (C)</p> Signup and view all the answers

What is the purpose of a dictionary attack in the context of password cracking?

<p>To use a list of words to try and guess a password (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser