SURVEY OF OPERATING SYSTEMS
6th Edition
ISBN: 9781260096002
Author: Holcombe
Publisher: RENT MCG
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 2, Problem 5MCQ
Program Description Answer
When a browser opens wrong webpage, then it is a symptom of malware called as “Browser hijacking”.
Hence, the correct answer is option “C”.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers in order to collect information from people who make the same typo. What kind of attack is this? a. Phishing b. Baiting c. Quid pro quo d. Tailgating
6) _________ attacks include impersonating another user, altering messages in transit
between client and server and altering information on a Web site.
A) Active B) Passive
C) DoS D) Replay
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company’s servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? a. Principle of least privilege b. Insider threat c. Vulnerability d. Denial of service
Chapter 2 Solutions
SURVEY OF OPERATING SYSTEMS
Ch. 2 - Prob. 1KTQCh. 2 - Prob. 2KTQCh. 2 - Prob. 3KTQCh. 2 - Prob. 4KTQCh. 2 - Prob. 5KTQCh. 2 - Prob. 6KTQCh. 2 - Prob. 7KTQCh. 2 - Prob. 8KTQCh. 2 - Prob. 9KTQCh. 2 - Prob. 10KTQ
Ch. 2 - Prob. 1MCQCh. 2 - This type of annoyance appears uninvited in a...Ch. 2 - With this Windows feature turned on (as it is by...Ch. 2 - Prob. 4MCQCh. 2 - Prob. 5MCQCh. 2 - Prob. 6MCQCh. 2 - Prob. 7MCQCh. 2 - Prob. 8MCQCh. 2 - Prob. 9MCQCh. 2 - Prob. 10MCQCh. 2 - Prob. 11MCQCh. 2 - Prob. 12MCQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 1EQCh. 2 - Consider the following statement: User Account...Ch. 2 - Why should you disable the Guest account?Ch. 2 - Prob. 4EQCh. 2 - Prob. 5EQ
Knowledge Booster
Similar questions
- 74) Which of the following is a consequence of just a phlashing attack? A. Personal information is stolen B. Affected device must be replaced C. Affected device must be reflashed D. None of the abovearrow_forward11 ILOVEYOU virus spread on the internet with amazing speed through A. E-Mail message B. Plug-Ins C. Trojan horse D. All of the abovearrow_forwardHow can an attacker use a hoax? a. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. b. By sending out a hoax, an attacker can convince a user to read his e-mail more often. c. A user who receives multiple hoaxes could contact his supervisor for help. d. Hoaxes are not used by attackers today.arrow_forward
- In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? A.) Trojan horse B.) Virus C.) Worm D.) Spywarearrow_forwardA. Suppose that while trying to access a collection of short videos on a Web site, you see a popup window stating that you need to install custom codec in order to view the videos. What threat might be posed to your computer system if you accept the installation request? B. Name five X.800 security services. Provide a brief description for each service.arrow_forwardLet's pretend you receive a notification from the company's email server informing you that your password has been changed and needs to be confirmed. Unfortunately, you haven't changed the password recently. The previous password no longer works; what caused the switch? Which viruses and other threats to computers may have provided an attacker access to the necessary information to change the password?arrow_forward
- Which of the following products can an institution prefer to use if its antivirus software is up-to-date on the computers in its network?A) FirewallB) DLPC) Web ProxyD) NACarrow_forwardAssume you get a message from your company's mail server notifying you that your password has changed and you must confirm it. But, you have not updated the password. What caused the password to be changed? Which computer applications and viruses may have given an attacker with the necessary knowledge to change the password?arrow_forwardSuppose that while trying to access a collection of short videos on a website, you see a popup window stating that you need to install a custom codec in order to view the videos. What threat might be posed to your computer system if you accept the installation request? Hackers typically gather information as the first step of an attack on a network. Gathering information normally involves three phases—footprinting, scanning, and enumeration. Briefly describe each of these three phasesarrow_forward
- Assume you receive an alert from your company's mail server notifying you that the password for your account has been changed and that you must confirm the change.However, as far as you are aware, you have not changed the password!What may have caused the password to be changed?What type of virus, and which computers, could have provided an attacker with the information needed to successfully reset the password?arrow_forward12) When using HTTPS, the web browser's IP address is encrypted before being sent to the server. True False 13) The HSTS flag is used to protect against which type of threat? A man-in-the middle attacker who intercepts https requests and rewrites them as http requests A man-in-the middle attacker who presents forged SSL certificates in order to intercept communications. A phishing attacker who impersonates a legitimate website. A man-in-the-middle attacker who forces downgrades to outdated encryption versions used in TLS. 14) Suppose a website implements a login page with a form. Answer the following 8 questions as True (yes) or False (no). If the form is submitted via GET request using HTTP, can a network adversary (i.e., one who can observe all network communications) obtain the password? True False 15) If the form is submitted via GET request using HTTP, can a browser adversary (i.e., one who can locally observe the URLs requested by the user) obtain the password?…arrow_forward1) This type of attack sends out several e-mails to trick users into revealing personal information in hopes someone responds. a) Ransomeware b) Pharming c) Trojan horse d) Phishingarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,