Professional Documents
Culture Documents
Correct 2
Correct 2
Page 1|3
9. This is the name given to amateur hackers.
a) Hacktivist
b) Gray Hat
c) Black Hat
d) Script Kiddies
a) Internal
b) Gray hat
c) External
d) Black Hat
Chapter Summary
weak passwords
unsecured network protocols
misconfigured firewalls
When an attacker discovers a security vulnerability in a system, they will attempt to exploit it to
gain access or control of the system. The process of exploiting a vulnerability involves the following
steps:
Reconnaissance
Escalation of Privileges
Exploitation
Maintaining Access
Covering Tracks
3) Describe types of malware and their symptoms, methods of infiltration, methods used to deny
service:
Page 2|3
appearing on the screen. Ransomware can deny service by rendering files inaccessible until
the ransom is paid.
Virus : A virus is a program that infects other programs or files, and it can spread rapidly
through email attachments or infected downloads. Symptoms include slow computer
performance, frequent crashes, and missing files. Viruses can deny service by causing the
system to reboot continuously or by deleting critical system files.
Spyware : Spyware is designed to secretly monitor a user's computer activity, internet usage
or steal personal information such as usernames and passwords. Symptoms include slow
computer performance or odd behavior when browsing the web. Spyware can deny service
by launching an endless series of pop-up ads or redirecting users to unwanted websites.
Trojan : A trojan is a type of malware that disguises itself as a legitimate software program,
but instead it works quietly in the background to steal sensitive information or grant
unauthorized access. Symptoms may include slower computer performance or pop-up ads.
Trojans can deny service by opening up a backdoor on the infected machine or by deleting
important files.
A blended attack is a type of cyber attack that combines multiple methods or techniques to achieve
a specific goal, such as stealing data or taking control of a system. Blended attacks can use a
combination of social engineering, malware, and other tactics to bypass security measures and gain
unauthorized access to a network or system.
Impact reduction is important in the context of blended attacks because the goal is to minimize the
overall impact of an attack. Impact reduction strategies can include things like regular data backups,
network segmentation, security monitoring and incident response plans. By implementing these
measures, organizations can minimize the overall damage caused by a potential breach.
Page 3|3