A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.
2. What is a significant characteristic of virus malware?
A. A virus can execute independently of the host system.
B. Once installed on a host system, a virus will automatically propagate itself to other systems.
C. Virus malware is only distributed over the Internet.
D. A virus is triggered by an event on the host system.
A virus is malicious code that is attached to a legitimate program or executable file, and requires specific activation, which may include user actions or a time-based event. When activated, a virus can infect the files it has not yet infected, but does not automatically propagate itself to other systems. Self-propagation is a feature of worms. In addition to being distributed over the Internet, viruses are also spread by USB memory sticks, CDs, and DVDs.
3. Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?
An access attack tries to affect services that affect entry into accounts, databases, and other sensitive information. Access attacks commonly involve a dictionary ths is used to guess a specific user password. A brute-force access attack would try to access an account via repeated attempts.
4. What is the purpose of a reconnaissance attack on a computer network?
A. To gather information about the target network and system
B. To prevent users from accessing network resources
C. To redirect data traffic so that it can be monitored
Preventing users from accessing network resources is a denial of service attack. Being able to steal data from the network servers may be the objective after a reconnaissance attack gathers information about the target network and system. Redirecting data traffic so it can be monitored is a man-in-the middle attack.
5. To which category of security attacks does man-in-the-middle belong?
A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.
8. What is the best description of Trojan horse malware?
A. It is software that causes annoying but not fatal computer problems.
B. It is malware that can only be distributed over the Internet.
C. It is the most easily detected form of malware.
D. It appears as useful software but hides malicious code.
The best description of Trojan horse malware, and what distinguishes it from viruses and worms, is that it appears as useful software but hides malicious code. Trojan horse malware may cause annoying computer problems, but can also cause fatal problems. Some Trojan horses may be distributed over the Internet, but they can also be distributed by USB memory sticks and other means. Specifically targeted Trojan horse malware can be some of the most difficult malware to detect.
9. Which tool is used to provide a list of open ports on network devices?
Many threat actors use stealthy evasion techniques to disguise an attack payload because the malware and attack methods are most effective if they are undetected. The goal is to prevent detection by network and host defenses.
12. What is the purpose of a rootkit?
A. To masquerade as a legitimate program
B. To replicate itself independently of any other programs
C. To gain privileged access to a device while concealing itself