Last Updated on May 20, 2021 by Admin
ITC -- Chapter 2 Ethics Quiz
0 of 8 questions completed
ITC — Chapter 2 Ethics Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 8 questions answered correctly
Time has elapsed
You have reached 0 of 0 points, (0)
1. Question2 pointsWhich two characteristics describe a worm? (Choose two.)Correct
Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside.
2. Question1 pointsIn what way are zombies used in security attacks?Correct
Zombies are infected computers that make up a botnet. The zombies are used to deploy a distributed denial of service (DDoS) attack.
3. Question1 pointsWhich tool is used to provide a list of open ports on network devices?Correct
The Nmap tool is a port scanner that is used to determine which ports are open on a particular network device. A port scanner is used before launching an attack.
4. Question1 points
Which type of attack allows an attacker to use a brute force approach?Correct
Common ways used to crack Wi-Fi passwords include social engineering, brute-force attacks, and network sniffing.
5. Question1 pointsWhat is the primary goal of a DoS attack?Correct
A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.
6. Question1 pointsWhat is the purpose of a rootkit?Correct
– Virus (self replicates by attaching to another program or file)
– Worm (replicates independently of another program)
– Trojan Horse (masquerades as a legitimate file or program)
– Rootkit (gains privileged access to a machine while concealing itself)
– Spyware (collects information from a target system)
– Adware (delivers advertisements with or without consent)
– Bot (waits for commands from the hacker)
– Ransomware (holds a computer system or data captive until payment is received)ent)
7. Question1 points
Which example illustrates how malware might be concealed?Correct
An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.
8. Question1 pointsWhat is the most common goal of search engine optimization (SEO) poisoning?Correct
A malicious user could create a SEO so that a malicious website appears higher in search results. The malicious website commonly contains malware or is used to obtain information via social engineering techniques.