Term
A SYNÂ is an example of what type of attack? |
|
Definition
|
|
Term
An attack in which the attacker simply listens for all traffic being transmitted across a network, in the hope of viewing something suchs as user ID and password combination is known as: |
|
Definition
|
|
Term
Which attack takes advantage of a trusted realtionship that exists between the two systems? |
|
Definition
|
|
Term
In what type of attack does an attacker resend the series of commands and codes used in a financial transaction to cause the transaction to be conducted several times? |
|
Definition
|
|
Term
An attacker's ability to crack passwords is directly related to the method the user employed to create a password, as well as: |
|
Definition
The dictionary and rules used by cracking program |
|
|
Term
A piece of malicious code that must attach itself to another file to replicate itself is known as: |
|
Definition
|
|
Term
A piece of malacious code that appears to be designed to do one thing (and may in fact do that thing) but hides some other payload often malicious) is known as: |
|
Definition
|
|
Term
Malicious code thats is set to execute its payload in a specific time is known as: |
|
Definition
A logic bomb or A time bomb |
|
|
Term
Making data look like it has come froma a different source is called |
|
Definition
|
|
Term
A term used to refer to the process of taking of an already existing session between client and server is |
|
Definition
|
|