Podcast
Questions and Answers
What is the method used by an attacker to gain access to private or confidential information over the telephone?
What is the method used by an attacker to gain access to private or confidential information over the telephone?
What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?
What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?
What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?
What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?
What is the goal of an attacker using pretexting?
What is the goal of an attacker using pretexting?
Signup and view all the answers
What is the purpose of pharming?
What is the purpose of pharming?
Signup and view all the answers
What is a critical component of system development?
What is a critical component of system development?
Signup and view all the answers
What is the approach to software development that involves creating systems with security objectives in mind?
What is the approach to software development that involves creating systems with security objectives in mind?
Signup and view all the answers
What type of security problem occurs when user input is passed directly to a compiler or interpreter?
What type of security problem occurs when user input is passed directly to a compiler or interpreter?
Signup and view all the answers
What is the goal of an attacker using cross-site scripting?
What is the goal of an attacker using cross-site scripting?
Signup and view all the answers
What is the consequence of failure to handle errors in a program?
What is the consequence of failure to handle errors in a program?
Signup and view all the answers
What is the main cause of command injection problems?
What is the main cause of command injection problems?
Signup and view all the answers
What is the primary objective of software assurance?
What is the primary objective of software assurance?
Signup and view all the answers
What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?
What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?
Signup and view all the answers
What is the process of attempting to reverse-calculate a password?
What is the process of attempting to reverse-calculate a password?
Signup and view all the answers
What is the term for the application of computing and network resources to try every possible password combination?
What is the term for the application of computing and network resources to try every possible password combination?
Signup and view all the answers
What is the primary goal of a backdoor attack?
What is the primary goal of a backdoor attack?
Signup and view all the answers
What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?
What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?
Signup and view all the answers
What is the purpose of a dictionary attack in the context of password cracking?
What is the purpose of a dictionary attack in the context of password cracking?
Signup and view all the answers