IT 306: Multimedia Technologies Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the method used by an attacker to gain access to private or confidential information over the telephone?

  • Timing Attack
  • Pretexting (correct)
  • Pharming
  • Trojan

What type of attack involves the redirection of legitimate Web traffic to an illegitimate site?

  • Malware Attack
  • Phishing
  • Pharming (correct)
  • Trojan Attack

What type of attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system?

  • Pharming Attack
  • Malware Infection
  • Trojan Horse Attack
  • Timing Attack (correct)

What is the goal of an attacker using pretexting?

<p>To gain access to private or confidential information (C)</p> Signup and view all the answers

What is the purpose of pharming?

<p>To obtain private information (A)</p> Signup and view all the answers

What is a critical component of system development?

<p>Methodology (A)</p> Signup and view all the answers

What is the approach to software development that involves creating systems with security objectives in mind?

<p>Software Assurance (B)</p> Signup and view all the answers

What type of security problem occurs when user input is passed directly to a compiler or interpreter?

<p>Command Injection (C)</p> Signup and view all the answers

What is the goal of an attacker using cross-site scripting?

<p>To steal user data (D)</p> Signup and view all the answers

What is the consequence of failure to handle errors in a program?

<p>Unexpected system behaviors (A)</p> Signup and view all the answers

What is the main cause of command injection problems?

<p>Failure to validate user input (B)</p> Signup and view all the answers

What is the primary objective of software assurance?

<p>To create software that can be deployed in a secure fashion (A)</p> Signup and view all the answers

What is a type of attack where an attacker gains access to a system or network resource through a previously unknown access mechanism?

<p>Backdoor attack (B)</p> Signup and view all the answers

What is the process of attempting to reverse-calculate a password?

<p>Password Cracking (A)</p> Signup and view all the answers

What is the term for the application of computing and network resources to try every possible password combination?

<p>Brute Force Attack (A)</p> Signup and view all the answers

What is the primary goal of a backdoor attack?

<p>To gain unauthorized access to a system or network (C)</p> Signup and view all the answers

What is the term for a type of attack where an attacker uses a legitimate-looking message to distribute malware or gain access to a system?

<p>Masked Attack (C)</p> Signup and view all the answers

What is the purpose of a dictionary attack in the context of password cracking?

<p>To use a list of words to try and guess a password (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser