A type of virus that conceals its presence by intercepting system requests and altering service outputs.
What is Stealth?
The single greatest threat to network security
What are employees?
An attacker pretending to be from a trusted organization sends an email asking users to access a website to verify personal information.
What is Phishing?
The term for the process of validating a subject's identity.
What is Authentication?
Running a hard disk through a disk shredder, physically destroying the drive.
What is Shredding?
It monitors the actions you take on your machine and sends the information back to its originating source.
What is Spyware?
A type of attack that is most likely to succeed with communications between instant messaging clients.
What is Sniffing?
An attacker gathers personal information about the target individual, who is a CEO.
What is Whaling?
The type of password that uses maryhadalittlelamb.
What is Pass phrase?
The removal of sensitive data, ensuring that the data cannot be reconstructed by any known technique.
What is Purging?
Undetectable software that allows administrator-level access.
What is Rootkit?
A type of security threat exists when this user account is used to perform administrative functions.
What is Privilege escalation?
The type of attack in which a user distributes hoax virus information emails.
What is Social Engineering Attack?
The most important aspect of a biometric device?
What is Accuracy?
The attack that takes the longest amount of time to complete.
What is Brute force attack?
Another name for a logic bomb.
What is Asynchronous attack?
Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode.
What is MAC Flooding?
An attacker convinces personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.
What is Masquerading?
Another term for the type of login credentials provided by a token device.
What is One-time password?
One of the data destruction techniques that uses a punch press or hammer system to crush a hard disk.
What is pulverizing?
The primary distinguishing characteristic between a worm and a logic bomb.
What is Self-replication?
A typical goal of MAC spoofing.
What is Bypassing 802.1x port-based security?
A program writing development modes that uses the method that allows for optimal control over coherence, security, accuracy, and comprehensibility?
What is Structured programming?
An access control model that is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject.
What is Attribute-Based Access Control?
A form of Two cryptographic attack exploits, two different messages or files produce the same hashing digest, then a collision has occurred.
What is Birthday attack?