Test 1 Flashcards

1
Q

how long are IPv4 addresses

A

32-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a network standards architecture ?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ are pieces of code that attach to other programs and get executed when the infested program is executed

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pieces of code that are executed after the virus or worm has spread are called___

A

Payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware programs that masquerade as system files are called

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly