IT 306: Multimedia Technologies Quiz
18 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the method used by an attacker to gain access to private or confidential information over the telephone?

  • Timing Attack
  • Pretexting (correct)
  • Pharming
  • Trojan
  • What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?

  • Malware Attack
  • Phishing
  • Pharming (correct)
  • Trojan Attack
  • What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?

  • Pharming Attack
  • Malware Infection
  • Trojan Horse Attack
  • Timing Attack (correct)
  • What is the goal of an attacker using pretexting?

    <p>To gain access to private or confidential information</p> Signup and view all the answers

    What is the purpose of pharming?

    <p>To obtain private information</p> Signup and view all the answers

    What is a critical component of system development?

    <p>Methodology</p> Signup and view all the answers

    What is the approach to software development that involves creating systems with security objectives in mind?

    <p>Software Assurance</p> Signup and view all the answers

    What type of security problem occurs when user input is passed directly to a compiler or interpreter?

    <p>Command Injection</p> Signup and view all the answers

    What is the goal of an attacker using cross-site scripting?

    <p>To steal user data</p> Signup and view all the answers

    What is the consequence of failure to handle errors in a program?

    <p>Unexpected system behaviors</p> Signup and view all the answers

    What is the main cause of command injection problems?

    <p>Failure to validate user input</p> Signup and view all the answers

    What is the primary objective of software assurance?

    <p>To create software that can be deployed in a secure fashion</p> Signup and view all the answers

    What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?

    <p>Backdoor attack</p> Signup and view all the answers

    What is the process of attempting to reverse-calculate a password?

    <p>Password Cracking</p> Signup and view all the answers

    What is the term for the application of computing and network resources to try every possible password combination?

    <p>Brute Force Attack</p> Signup and view all the answers

    What is the primary goal of a backdoor attack?

    <p>To gain unauthorized access to a system or network</p> Signup and view all the answers

    What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?

    <p>Masked Attack</p> Signup and view all the answers

    What is the purpose of a dictionary attack in the context of password cracking?

    <p>To use a list of words to try and guess a password</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser