IT 306: Multimedia Technologies Quiz

DetachableStarfish avatar
DetachableStarfish
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What is the method used by an attacker to gain access to private or confidential information over the telephone?

Pretexting

What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?

Pharming

What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?

Timing Attack

What is the goal of an attacker using pretexting?

To gain access to private or confidential information

What is the purpose of pharming?

To obtain private information

What is a critical component of system development?

Methodology

What is the approach to software development that involves creating systems with security objectives in mind?

Software Assurance

What type of security problem occurs when user input is passed directly to a compiler or interpreter?

Command Injection

What is the goal of an attacker using cross-site scripting?

To steal user data

What is the consequence of failure to handle errors in a program?

Unexpected system behaviors

What is the main cause of command injection problems?

Failure to validate user input

What is the primary objective of software assurance?

To create software that can be deployed in a secure fashion

What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?

Backdoor attack

What is the process of attempting to reverse-calculate a password?

Password Cracking

What is the term for the application of computing and network resources to try every possible password combination?

Brute Force Attack

What is the primary goal of a backdoor attack?

To gain unauthorized access to a system or network

What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?

Masked Attack

What is the purpose of a dictionary attack in the context of password cracking?

To use a list of words to try and guess a password

Test your knowledge on malicious attacks and cybersecurity threats, including social engineering tactics and phishing techniques, in the context of multimedia technologies.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser