CYBER SECURITY FINAL (complete)

¡Supera tus tareas y exámenes ahora con Quizwiz!

If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack.

Buffer-overflow

You cannot disable some USB devices from end-user computers and allow others.

False

Windows stores passwords using a method called __________.

Hashing

The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.

Heuristic

When an employee leaves, all _______ should be terminated.

Logins

Using the _________ cipher you select multiple numbers by which to shift letters.

Multi-alphabet substitution

________ refers to unencrypted text.

Plain text

A virus is any file that can self-replicate.

True

No protocols operate at the physical layer of the OSI model

True

VI (value of information) = C (cost to produce) + VG (value gained).

True

Typically, when you update virus definitions _____________.

Your computer restarts

The IP command-line command determines your computer's IP address, subnet mask, and default gateway is ping

False

The Patriot Act was the first U.S. law to criminalize theft of commercial trade secrets.

False

The Sasser virus/buffer overflow attack spreads by copying itself to shared drives and emailing itself out to everyone in your address book.

False

The TCP protocol works at the network layer of the OSI model

False

The first four bytes of the MAC address identify the vendor

False

The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.

False

The name you type into a browser's address bar, such as, is known as the IP locator.

False

The process to induce you to provide personal information through a website is called cyberstalking.

False

Cipher text is encrypted text.

True

Experts consider Romania the country with the strictest cybercrime laws.

True

L2TP uses IPsec for its encryption.

True

Security policies toward programmers and web developers are developmental policies.

True

Firefox and Google Chrome are examples of ____________.

Web browsers

One defense against denial-of-service attacks is to _______ ICMP packets.

Block

The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal information for purposes of blackmail was ______.

Bloomberg, Inc.

_________ attacks are becoming less common in modern operating systems.

Buffer overflow

If an IP address has the number 194 in the first octet, it is a class _______ address.

C

Which of the following is one way to protect yourself against identity theft?

Do not provide personal information to anyone if it is not absolutely necessary.

To create a domain admin account, the user must be a member of the __________ group.

Domain admins

Java and ActiveX codes should be scanned before they are _________.

Downloaded to your computer

In which firewall configuration is the firewall running on a server with at least two network interfaces?

Dual-homed host

__________ is the most obvious reason for organizations to provide their users with Internet access.

Email

______________ is the process to scramble a message or other information so that it cannot be easily read.

Encryption

___________ is the process to find out what is on a target system

Enumeration

For security reasons, when an employee leaves a company, you should conduct a(n) ________ interview.

Exit

Which TCP/IP protocol operates on ports 20 and 21 and is used for transferring files between computers?

FTP

A good password should contain only letters and numbers.

False

A good password should have at least eight characters and use all lowercase letters.

False

A screening firewall works in the application layer of the OSI model.

False

A smurf attack is a type of malware attack.

False

A teardrop attack involves sending a forged packet to the victim.

False

An echo-chargen attack occurs when the attacker sends a forged packet with the same source IP address and destination IP address as the target's IP address.

False

An on-demand virus scanner runs in the background and is constantly checking your PC.

False

The IP command-line command determines the number of hops it takes to get from your computer to its destination is ping

False

Mistaking a legitimate program for a virus is a ____________.

False positive

A _________ is a barrier between your network and the outside world.

Firewall

Which TCP/IP protocol operates on port 80 and displays web pages?

HTTP

Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

Harassment

The process to make a system as secure as it can be without adding on specialized software or equipment is _______________

Hardening

Which device can connect many computers and send packets out every port?

Hub

If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated.

IP address

_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.

Identity

1 / 1 pts The principal that users have access to only network resources when an administrator explicitly grants them is called ___________.

Implicit deny

______________ is the use of spying techniques to find out key information that is of economic value.

Industrial espionage

Passing structured query language commands to a web application and getting the website to execute it is called SQL script _________.

Injection

Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______

Instant messaging

The I Love You virus caused harm because ________.

It generated large numbers of emails that bogged down many networks.

The Microsoft Office suite is a tempting target for viruses because ___________.

It is designed so that legitimate programmers can access its internal objects.

A(n) ________ refers to the bits that are combined with the plain text to encrypt it.

Key

With asymmetric cryptography a different ______ is used to encrypt the message and to decrypt the message.

Key

The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself is a(n) _______________ attack.

Land

Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.

Least privileges

A firewall ______ is a tool that can provide information after an incident has occurred.

Log

The virus/worm that specifically targets Macintosh computers is ________.

MacDefender

The recommended Microsoft Edge privacy setting is _________.

Medium high

The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?

Microsoft

The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus.

Mimail

You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password. This is particularly important if your password policy has a history depth of five.

Minimum password age

On a server, you should create your own accounts with ________ that reflect their level of permission.

Names

In which firewall configuration is the software installed on an existing machine with an existing operating system?

Network host-based

One of the most popular port scanners in the hacking and security community is ________.

Nmap

Which of the following should NOT be a part of an organization's policy regarding email attachments?

None of the above

Which country is described by experts as having the strictest cybercrime laws?

None of the above (Romania)

The command-line command _______ 127.0.0.1 -l 65000 -w 0 -t will send multiple large packets to a computer, and when initiated by multiple senders may cause a denial-of-service attack.

None of the above (The ping command causes this attack on a target server)

For an individual machine that is not running firewall software, you do not directly close ports. You shut down the _________ using that port.

None of the above (you shut down the service using that port)

The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus.

Nonvirus

When using a chat room, one way to protect yourself from online harassment is ______.

Not to use your real name

An IP version 4 address consists of four numbers, separated by dots. Each number is called a(n) ________.

Octet

Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.

Once

Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?

Online shopping during a break time

_________ is a popular tool for cracking Windows passwords.

OphCrack

A packet-filtering firewall is a(n) ____________ firewall.

Packet filtering

Scanning bulletin boards, making phony phone calls, and visiting websites by a hacker are examples of _________.

Passive scanning

The first rule of computer security is to check ___________.

Patches

Testing an organization's security by using hacking techniques is known as ________ testing.

Penetration

Which of the following is the process to try to induce someone to provide you with personal information?

Phishing

Hacking into phone systems is called ___________.

Phreaking

The IP utility used to test connectivity with a remote host is _______.

Ping

The attack in which the attacker sends a packet that is too large and can shut down a target machine is a(n) ________________ attack.

Ping of Death

There are 1,024 well-known ________ that are usually associated with specific services.

Ports

A(n) __________ hides the internal network's IP address and presents a single IP address to the outside world.

Proxy server

With ______________ encryption, one key is used to encrypt a message, and another is used to decrypt the message.

Public key

Which defensive technique involves the server sending a wrong SYN+ACK to the client, so the client sends and RST packet notifying the server of an error? This makes the server think the client request is legitimate.

RST cookies

Which device is used to boost a signal?

Repeater

Which device can relay packets from one network to another and is usually programmable?

Router

The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.

Routers

Which TCP/IP protocol operates on port 25 and sends email?

SMTP

With a(n) _________ scan, if the port is closed, the response is an RST. If the port is open, the response is a SYN/ACK.

SYN

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won't infect the system is ________.

Sandbox

The net command can be included in a ________ that will create a domain admin account.

Script

Some who performs a cyberattack without actually understanding it is a _______.

Script kiddie

A document that defines how an organization deals with some aspect of security is a(n) __________.

Security policy

New employees should receive a copy of the company's __________ policies.

Security/acceptable use

Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address, causing the network to perform a DoS attack on one of more of its member servers?

Smurf IP attack

Sending an email that claims to come from a different sender, and asking for sensitive data is an example of ___________.

Social engineering

The most obvious use of ________________involves talking to an employee and getting him to reveal sensitive data.

Social engineering

Cookies and key loggers are examples of ____________.

Spyware

Which defensive technique involves altering the TCP stack on the server so that it will take less time to timeout when a SYN connection is left incomplete?

Stack tweaking

Quick Stego and Invisible Secrets are two software tools that can be used for __________.

Steganography

Which device can connect many computers and sends data only out of one port based on MAC address?

Switch

Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies.

System administration

Micro blocks, SYN cookies, RST cookies, and stack tweaking are defenses against ______.

TCP SYN flood attacks

The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack.

Teardrop

A file that stays in memory after it executes is a(n) _____________.

Terminate and Stay Resident program

Why should a cybercrime law be specific?

To prevent defendants from finding loopholes

Which of these is NOT a type of symmetric algorithm?

Transcription

One tool used for a denial-of-service attack is ______________.

Tribal Flood Network

A denial-of-service attack is one of the most common attacks on a system.

True

A digital signature is used to guarantee who sent a message. This is referred to as non-repudiation.

True

A firewall can be configured to disallow certain types of incoming traffic that may be attacking.

True

A good rule of thumb for a password history policy is a history depth of five.

True

A host is a machine with data on it, to which you can connect

True

A key logger can be hardware-based of software-based.

True

A rootkit provides the hacker root or privileged access.

True

A security policy is a document that defines how an organization deals with some aspect of security.

True

A server with fake data used to attract an attacker is a honeypot.

True

A stateful packet inspection firewall examines each packet, and denies or permits access based not only on the current packet, but also on data derived from previous packets in the conversation.

True

A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.

True

ACK scans and NULL scans provide standard responses only on UNIX systems.

True

After a virus is on your system, it can do anything a legitimate program can do.

True

After an employee discontinues employment, his or her workstation hard drive should be searched.

True

An organization should not permit end users to install anything on their computer.

True

Binary numbers are made up of 0s and 1s.

True

Blocking ICMP packets may help prevent denial-of-service attacks.

True

CNE, MCITP, CISSP, and CCNA are examples of industry certifications.

True

Employees with access to any sensitive information should be asked to sign nondisclosure agreements.

True

Every open port on a router is a possible avenue of entry for a malware or intruder.

True

Experience is the most important factor when looking for a security professional.

True

Hacking into phone systems is also known as phreaking.

True

Heuristic scanning uses rules to determine whether a file or program behaves like a virus.

True

Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception. Correct!

True

Industrial espionage is the use of spying techniques to find out key information that is of economic value.

True

Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user's machine.

True

MAC addresses are unique addresses for each NIC

True

Malware that executes when a specific criteria is met is a logic bomb.

True

Malware that is portable to all operating systems or platforms is considered web-based code.

True

Microsoft Baseline Security Analyzer (MBSA) checks one or more Windows machines to see if they have basic security in place.

True

Microsoft Windows includes BitLocker in some editions, so entire hard drives can be encrypted.

True

Nessus is the premiere network vulnerability scanner.

True

One good practice in a chat room is not to use your real name.

True

One good rule that applies to online investing is "Never invest money that you cannot afford to lose."

True

One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings.

True

Ping scanning may be stopped by blocking ICMP packets.

True

Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.

True

Stack tweaking is a method to alter the TCP stack so that a timeout takes less time when a SYN connection is left incomplete.

True

The group Anonymous is a supporter of Wikileaks founder Julian Assange and launched multiple distributed denial-of-service attacks on various financial companies.

True

The most common method to deliver spyware to a target system is by using a Trojan horse.

True

The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts.

True

The most widely used symmetric key algorithm is Advanced Encryption Standard.

True

The ping -l option changes the size of the packet you can send.

True

The session layer of the OSI model provides the mechanism to manage the dialogue between end-user application processes

True

There should be a firewall between your network and the outside world.

True

When an administrator proactively seeks out intelligence on potential threats or groups, this is called infiltration.

True

Windows passwords are stored in a hash file in one of the system directories.

True

If you determine a virus has struck a system, the first step is to _________.

Unplug the machines from the network

One way to protect yourself on auction sites is _____________.

Use a separate credit card with a low limit.

The most common way for a virus to spread is by __________.

Use of your email contacts

Password guidelines, Internet use, how to handle email attachments, and software installation processes are areas of ______.

User policies

VI (value of information) = C (cost to produce) + ___________.

VG (value gained)

Any file that can self-replicate is a ________.

Virus

McAfee and Norton are examples of ________.

Virus scanners

The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______.

W32/Netsky-P

A program that can propagate without human interference is a _______.

Worm

The command-line command to instruct the ping utility to send packets until explicitly told to stop is ping ____.

-t

A list of virus definitions is generally in a file with a ________ extension.

.dat

The command-line command to display all options for the ping command is ping ____.

/?

What is the binary equivalent of the decimal number 240?

11110000

A good password has at least ______ characters.

8

The single greatest security risk to any organization is _________.

A disgruntled employee

The virus/worm that combined email attachments along with a fake virus warning was the __________ virus.

Bagle

Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price?

Bid shielding

Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?

Bid siphoning

_________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits.

Blowfish

A _________ involves setting up two firewalls: an outer and an inner firewall.

DMZ (demilitarized zone)

Which TCP/IP protocol operates on port 53 using UDP and translates URLs into web addresses?

DNS

The plan to return a business to full normal operations is ____________

DRP

Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.

Data often has intrinsic value.

Which type of attack attempts to overload the system with requests, denying legitimate users access?

Denial of service

Which of the following is NOT an example of industrial espionage?

Denial-of-service attack

The background, screensaver, font size, and resolution are elements of _______.

Desktop configuration

Standards are specific instructions on how to handle a specific issue.

False

When fraudulent sellers bid on the seller's items to drive up the price, it is called bid shielding.

False

Windows has a built in firewall, but Linux does not.

False

Nmap enables you to set ________ such as -sP, -sS, and -oA.

Flags

Which of these is NOT one of the two basic types of cryptography?

Forward

The virus/worm that specifically targets Linux computers is ________.

None of the above

Any _________ you do not explicitly need should be shut down.

Ports

A(n)___________ firewall examines the entire conversation between client and server, not just individual packets.

Stateful Packet Inspection

The virus/worm transmitted in a zip file attached to an email with an enticing message is __________.

Troj/Invo-Zip

A program that looks benign but actually has a malicious purpose is a _______.

Trojan Horse

First-party cookies are the less likely to violate user privacy than third party cookies. Correct Answer

True

Passwords are an area of user policies.

True

The Bagle virus contained email attachments and a fake virus warning.

True

The category of intrusion detection systems that looks for patterns that don't match those of normal use is called anomaly detection.

True

Black hat hackers are also known as script kiddies.

False

Checking an organization's websites is a form of active scanning.

False

Crafting email and websites to specifically target certain victims is called dive bombing.

False

Firefox is an example of a phishing site.

False

For individual computers not running firewall software, you should directly close ports.

False

Funcrypt is a free tool that can be used to encrypt drives, folders, or partitions.

False

Hiding a message in images is an example of stenography.

False

IPsec can only encrypt the packet data but not the header information.

False

In a virus attack, the victim machine is the source.

False

Linux and Windows typically are not shipped with firewalls.

False

NMAP is a popular hacking tool.

False

NetBIOS is an example of a port scanner.

False

PGP involves only private key encryption.

False

Principal of least privilege means that no one person can perform critical tasks.

False

SYN cookies are a form of attack.

False

Sending a forged email asking for sensitive data is an example of steganography.

False

Sid2User, UserInfo, and UserDump are examples of password cracking tools.

False

Snort is an open-source firewall.

False

Someone who uses the Internet to harass, threaten, or intimidate another person is guilty of identity theft.

False

One classic denial-of-service attack distributed by email was _____________.

myDoom

Which of the following is an operation used on binary numbers not found in normal math?

AND

The conflict between the users' goal for unfettered access to data and the security administrator's goal to protect that data is an issue of ______________.

Access control

A password policy for a 90- or 180-day replacement schedule is called password ________.

Age

A(n) ___________is a set of steps for doing something.

Algorithm

The process to list assets that you believe support your organization is called ________.

Asset identification

If an IP address has the number 191 in the first octet, it is a class ______ address.

B

Using the __________ cipher you choose some number by which to shift each letter of a text.

Caesar

__________refers to encrypted text.

Cipher text

The most reliable Nmap scan is ____________ scan.

Connect

A file on your computer that websites use to store information about you is a _________.

Cookie

When an attacker injects client-side scripts into web pages viewed by other users so that those users interact with it, it is an example of _________.

Cross-site scripting

_________ is the art to write in or decipher secret code.

Cryptography

Which of the following involves using the Internet to harass, threaten, or intimidate another person?

Cyberstalking

A SQL statement may begin with the word SELECT.

True


Conjuntos de estudio relacionados

Neurological System Pharmacology

View Set

Section 7: Natural Dyes, pH, and Mordants

View Set

ATM S 211 Quiz/Assignment/TopHatQ's

View Set