Quiz 1.4: Network Security
Which of the following is not a method of protection from a man-in-the-middle attack?
What is the name of the attack that involves repeatedly trying different passwords until the correct one is found?
Which type of malware initially appears to be a useful application, but installs additional malware?
Which type of malware spreads by attaching itself to other programs?
What is the name of the encryption method that uses a pair of keys (public and private) to encrypt and decrypt data?
Which category of "hacker" is acting legally?
What is the name of the protocol that allows files to be securely transferred between computers over a network?
What is the term for the process of converting encrypted data back into its original form?
Which type of attack typically uses a botnet?
How can a system be protected against a denial-of-service attack?