1. Right Answer: A
Explanation: Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified by a malicious person. Even machines that operate as a closed system can be eavesdropped upon via monitoring the faint electromagnetic transmissions generated by the hardware such as TEMPEST.
2. Right Answer: E
Explanation:
3. Right Answer: C
Explanation: Distributed denial of service (DDoS) attacks are common, where a large number of compromised hosts ('zombie computers') are used to flood a target system with network requests, thus attempting to render it unusable through resource exhaustion.
4. Right Answer: C
Explanation: Distributed denial of service (DDoS) attacks are common, where a large number of compromised hosts are used to flood a target system with network requests.One technique to exhaust victim resources is through the use of an attack amplifier - where the attacker takes advantage of poorly designed protocols on 3rd party machines in order to instruct these hosts to launch the flood.
5. Right Answer: C
Explanation: A backdoor may take the form of an installed program (e.g., Back Orifice) or could be in the form of an existing 'legitimate' program, or executable file. A specific form of backdoors are rootkits, which replaces system binaries and/or hooks into the function calls of the operating system to hide the presence of other programs, users, services and open ports.