Podcast
Questions and Answers
What is the method used by an attacker to gain access to private or confidential information over the telephone?
What is the method used by an attacker to gain access to private or confidential information over the telephone?
- Timing Attack
- Pretexting (correct)
- Pharming
- Trojan
What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?
What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?
- Malware Attack
- Phishing
- Pharming (correct)
- Trojan Attack
What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?
What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?
- Pharming Attack
- Malware Infection
- Trojan Horse Attack
- Timing Attack (correct)
What is the goal of an attacker using pretexting?
What is the goal of an attacker using pretexting?
What is the purpose of pharming?
What is the purpose of pharming?
What is a critical component of system development?
What is a critical component of system development?
What is the approach to software development that involves creating systems with security objectives in mind?
What is the approach to software development that involves creating systems with security objectives in mind?
What type of security problem occurs when user input is passed directly to a compiler or interpreter?
What type of security problem occurs when user input is passed directly to a compiler or interpreter?
What is the goal of an attacker using cross-site scripting?
What is the goal of an attacker using cross-site scripting?
What is the consequence of failure to handle errors in a program?
What is the consequence of failure to handle errors in a program?
What is the main cause of command injection problems?
What is the main cause of command injection problems?
What is the primary objective of software assurance?
What is the primary objective of software assurance?
What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?
What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?
What is the process of attempting to reverse-calculate a password?
What is the process of attempting to reverse-calculate a password?
What is the term for the application of computing and network resources to try every possible password combination?
What is the term for the application of computing and network resources to try every possible password combination?
What is the primary goal of a backdoor attack?
What is the primary goal of a backdoor attack?
What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?
What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?
What is the purpose of a dictionary attack in the context of password cracking?
What is the purpose of a dictionary attack in the context of password cracking?
Flashcards are hidden until you start studying