IS 501 ch. 1-5 quiz questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are the three approaches to security? a. perimeter, layered, hybrid b. high security, medium security, low security c. internal, external, and hybrid d. perimeter, complete, none

A. perimeter, layered, hybrid

Mary is teaching an introductory cybersecurity course to freshmen. She is explaining to them the major threats. which of the following is NOT one of the three major classes of threats? a. attempts to intrude on the system b. online auction fraud c. denial of service attacks d. a computer virus

B. online auction fraud

Being able to define attack terms is an important skill for a cybersecurity professional. What is spyware? a. any software that monitors your system b. only software that logs keystrokes c. any software used to gather intelligence d. only software that monitors what websites you visit

a. Any software that monitors your system

when considering the various attacks that can be executed on your system, it is important to understand which attacks are most common. Of the following, which is one of the most common and simplest attacks on a system? a. Denial of service attack b. buffer overflow c. session hacking d. password cracking

a. Denial of service attack

Sharice is trying to teach a new technician basic networking terms. What should she tell this new technician NIC stands for? a. Network interface card b. Network interaction card c. Network interface connector d. Network interaction connector

a. Network interface card

a range of countermeasures can help defend against DoS attacks. What are the three methods for protecting against SYN flood attacks? a. SYN cookies, RST cookies, and stack tweaking b. SYN cookies, DoS cookies, and stack tweaking c. DoS cookies, RST cookies, and stack deletion d. DoS cookies, SYN cookies, and stack deletion

a. SYN cookies, RST cookies, and stack tweaking

Candice is discussing Internet fraud with a colleague. She is trying to explain the most common types of fraud. What is the term for the most common type of Internet investment fraud? a. The Nigerian fraud b. The Manhattan fraud c. The pump and dump d. The bait and switch

a. The Nigerian fraud

Which of the following was one of the three universities involved in the original distributed network set up by a government agency? a. UC Berkely b. Harvard c. MIT d. Princeton

a. UC Berkely

which of the following is the most basic security activity? a. authentication b. firewalls c. password protection d. auditing

a. authentication

what is the name if the very first virus ever detected? a. creeper b. wabbit c. mimail d. unnamed

a. creeper

which layer of the OSI model is divided into two sublayers? a. data link b. network c. presentation d. session

a. data link

which of the following is something a Trojan horse might do? a. open a backdoor for malicious software b. change your memory configuration c. change ports on your computer d. alter your IP address

a. open a backdoor for malicious software

what type of attack is dependent on sending packets that are too large for the server to handle? a. ping of death b. smurf attack c. slammer attack d. DDoS

a. ping of death

Defining your security strategy is an important step in securing a network. You are trying to classify devices based on the approach they take to security. An intrusion detection system is an example of which of the following? a. proactive security b. perimeter security c. hybrid security d. good security practices

a. proactive security

Isabelle is responsible for cybersecurity at her company. She is concerned that a virus would cause damage to the IT systems. What is the most common damage caused by virus attacks? a. slowing down networks by the virus traffic b. deleting files c. changing the Windows Registry d. corrupting the operating system

a. slowing down networks by the virus traffic

what is the name for the hacking technique that involves using persuasion and deception to get a person to provide information to help compromise security? a. social engineering b. conning c. human intel d. soft hacking

a. social engineering

What is malware? a. software that has some malicious purpose b. software that is not functioning properly c. software that damages your system d. software that is not properly configured for your system

a. software that has some malicious purpose

You have just taken over as network security administrator for a small community college. You want to take steps to secure your network. Before you can formulate a defense for a network, what do you need? a. appropriate security certification b. a clear picture of the dangers to be defended against c. to finish this textbook d. the help of an outside consultant

b. A clear picture of the dangers to be defended against

Being able to define attack terms is an important skill for a cybersecurity professional. What is a computer virus? a. any program that is downloaded to your system without your permission b. any program that self replicates c. any program that causes harm to your system d. any program that can change your Windows Registry

b. Any program that self replicates

the first computer incident-response team is affiliated with what university? a. Massachusetts Institution of Technology b. Carnegie-Mellon University c. Harvard University d. California Technical University

b. Carnegie-Mellon University

Mohammed need to open a firewall port so that web traffic can be passed through the firewall. What protocol is used for web pages, and on which port does it work? a. HTTP, port 21 b. HTTP, port 80 c. DHCP, port 80 d. DHCP, port 21

b. HTTP, port 80

which of the following is a unique hexadecimal number that identifies your network card? a. NIC address b. MAC address c. NIC ID d. MAC ID

b. MAC address

If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment? a. Yes; any threat of violence is harassment b. Probably not because both parties are anonymous, so the threat is not credible c. Yes; chat room threat are no different from threats in person d. Probably not because making a chat room threat is not the same as making a threat in person

b. Probably not because both parties are anonymous, so the threat is not credible

what is the term for submitting a fake but very high bid to deter other bidders? a. bid siphoning b. bid shielding c. shill bidding d. ghost bidding

b. bid shielding

what can you do on your local computer to protect your privacy? a. install a virus scanner b. install a firewall c. set your browser's security settings d. set your computer's filter settings

c. set your browser's security settings

what is the term for a seller bidding on her own item to drive up the price? a. bid siphoning b. bid shielding c. shill bidding d. ghost bidding

c. shill bidding

what do you call a DoS attack launched from several machines simultaneously? a. wide-area attack b. smurf attack c. SYN flood d. DDoS attack

d. DDoS attack

Malek is purchasing cable to use in setting up small office networks. He wants to stock up on commonly used cable. What type of cable do most networks use? a. Net cable b. STP c. phone cable d. UTP

d. UTP

what percentage of cyber stalking cases escalate real-world violence? a. fewer than 1% b. about 25% c. 90% or more d. about 19%

d. about 19%

Jared is explaining various attacks to students in an introduction to cybersecurity class. He wants to make certain they fully understand the different attacks. What does a buffer-overflow attack do? a. it overflows a port with too many packets b. it puts more emails in an email system than it can hold c. it overflows the system d. it puts more data in a buffer than it can hold

d. it puts more data in a buffer than it can hold

how can securing internal routers help protect against DoS attacks? a. attacks cannot occur if the internal router is secured b. because attacks originate outside the network, securing internal routers cannot help protect against DoS c. securing the router will only stop router-based DoS attacks d. it will prevent an attack from propagating across network segments

d. it will prevent an attack from propagating across network segments

which of the following is a method that any person can use to protect against virus attacks? a. set up a firewall b. use encrypted transmissions c. use secure email software d. never open unknown email attachments

d. never open unknown email attachments

Elizabeth is explaining various hacking terms to a class. She is in the process of discussing the history of phone system hacking. What is the term for hacking a phone system? a. Telco-hacking b. hacking c. cracking d. phreaking

d. phreaking

what is the most significant weakness in a DoS attack from the attacker's viewpoint? a. the attack is often unsuccessful b. the attack is difficult to execute c. the attack is easy to stop d. the attack must be sustained

d. the attack must be sustained

You are trying to explain security to a nontechnical manager. She has taken a rather extreme view of computer security. Which of the following is one of the extreme viewpoints about computer security discussed in this chapter? a. the federal government will handle security b. Microsoft will handle security. c. there are no imminent dangers to your system d. there is no danger if you use Linux

C. There are no imminent dangers to your system

There are many threats on the internet. Which one of the following is the most common threat on the internet? a. auction fraud b. phreaking c. computer viruses d. illegal software

C. computer viruses

which U.S. government agency created the distributed network that formed the basis for the internet? a. Advanced Research Projects Agency b. Central Intelligence Agency c. NASA d. Department of Energy

a. Advanced Research Projects Agency

what protocol translates web addresses into IP addresses? a. DNS b. TFTP c. DHCP d. SMTP

a. DNS

There are classic attacks that, while several years old, are worthy of study due to there significance in the history of cybersecurity. Which of the following was rated by many experts (at the time) to be the fastest growing virus on the Internet? a. MyDoom virus b. bagle virus c. slammer virus d. smurf virus

a. MyDoom virus

There have been many different types of attacks over the years. Which of the following is an example of a DDoS attack? a. MyDoom virus b. bagle virus c. DoS virus d. smurf virus

a. MyDoom virus

you are explaining the history of networking to a group of first-year students. What did Tim Berners-Lee invent? a. The World Wide Web b. Email c. TCP d. the first computer virus

a. The World Wide Web

what is the most common class of DoS attacks? a. distributed denial of service b. smurf attacks c. SYN flood d. ping of death

a. distributed denial of service

what is the top way to protect yourself from cyber stalking? a. do not use your real identity online b. always use a firewall c. always use a virus scanner d. do not give out email addresses

a. do not use your real identity online

what is the top rule for avoiding internet fraud? a. if it seems too good to be true, it probably is b. never use your bank account numbers c. only work with people who have verifiable addresses d. do not invest in foreign deals

a. if it seems too good to be true, it probably is

why is it useful to have a separate credit card dedicated to online purchases? a. if the credit card number is used illegally, you will limit your financial liability b. you can keep better track of your auction activities c. if you are defrauded, you can possibly get the credit card company to handle the problem d. you can easily cancel that single card if you need to do so

a. if the credit card number is used illegally, you will limit your financial liability

what factor about the WannaCry virus is especially interesting to security practitioners? a. it could have been prevented with good patch management b. it deleted critical file systems c. it was difficult to protect against d. it was very sophisticated and likely an example of nation-state weaponized malware

a. it could have been prevented with good patch management

You are trying to identify potential DoS attack vectors. In doing so, you hope to provide mitigation for each of these attack vectors. Why will protecting against Trojan horse attacks reduce DoS attacks? a. many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack b. if you can stop a Trojan horse attack, you will also stop DoS attacks c. a Trojan horse will often open ports and thus allow DoS attacks d. a Trojan horse has much of the same effect as a DoS attack

a. many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack

What is the first step in protecting yourself from identity theft? a. never provide personal data about yourself unless it is absolutely necessary b. routinely check your records for signs of identity theft c. never use your real name on the Internet d. routinely check for spyware on your computer

a. never provide personal data about yourself unless it is absolutely necessary

which of the following is NOT an efficient method of protecting yourself from auction fraud? a. only use auctions for inexpensive items b. only use reputable auction sites c. only work with well-rated sellers d. only bid on items that seem realistic

a. only use auctions for inexpensive items

You are attempting to explain various DoS attacks to a new security technician. You want to make sure she can differentiate between these different attacks and notice the signs of a specific attack. What type of defense depends on changing the server so that unfinished handshaking times out sooner? a. stack tweaking b. RST cookies c. SYN cookies d. hash tweaking

a. stack tweaking

which of the following reasons most likely enables the Bagle virus to spread so rapidly? a. the email containing it claimed to be from the system administrator b. it copied itself across the network c. it was a sophisticated virus d. it was particularly virulent

a. the email containing it claimed to be from the system administrator

what is typically the goal of identity theft? a. to make illicit purchases b. to discredit the victim c. to avoid criminal prosecution d. to invade privacy

a. to make illicit purchases

Sheryl is explaining the OSI model to new technicians at her company. She is trying to explain what protocols operate at the various layers of the OSI model. At what layer of the OSI model does TCP operate? a. transport b. application c. network d. data link

a. transport

What type of cable is used in most networks? a. unshielded twisted-pair b. shielded-twisted pair c. unshielded untwisted-pair d. shielded untwisted-pair

a. unshielded twisted-pair

You are trying to develop methods to mitigate the threat of viruses in your company. Which of the following is the safest way to send and receive attachments? a. use a code word indicating that an attachment is legitimate b. send only spreadsheet attachments c. use encryption d. use virus scanners before opening attachments

a. use a code word indicating that an attachment is legitimate

Juan has just installed a new T1 line in a medical office. The front desk receptionist has asked what speed they can expect. A T1 line sends data at what speed? a. 100Mbps b. 1.54Mbps c. 155Mbps d. 56.6Kbps

b. 1.54Mbps

You are examining a list of IP addresses. Some are internal, some are external, and some are not valid. Which of the following is NOT a valid IP address? a. 127.0.0.1 b. 295.253.254.01 c. 131.156.5.2 d. 245.200.11.1

b. 295.253.254.01

John is working with command-line utilities to gather diagnostic information about a computer that cannot connect to the network. Which utility provides information about a machine's network configuration? a. Ping b. IPConfig c. Tracert d. MyConfig

b. IPConfig

what is a cookie? a. a piece of data that web servers gather about you b. a small file that contains data and is stored on your computer c. a piece of data that your web browser gathers about you d. a small file made that contains data and then is stored on the web server

b. a small file that contains data and is stored on your computer

which of the following types of privacy laws affect computer security? a. any state privacy law b. any privacy law applicable to your organization c. any privacy law d. any federal privacy law

b. any privacy law applicable to your organization

You are trying to form policies for your organization to mitigate the threat of viruses. You want to ensure that you address the most common way for a virus to spread. What is the most common way for a virus to spread? a. by copying to shared folders b. by email attachment c. by FTP d. by download from a website

b. by email attachment

While there are a wide range of different ways to execute a DoS attack, they are all predicated on the same idea. What is the basic concept behind all DoS attacks? a. computers do not handle TCP packets well b. computers can handle only a finite load c. computers cannot handle a large volume of TCP traffic d. computers cannot handle large loads

b. computers can handle only a finite load

according to a survey of 223 computer professionals prepared by the Computer Security Institute, which of the following was most often cited as an issue by respondents? a. internal systems b. employee abuse c. router d. internet connection

b. employee abuse

Aliya is active on online auctions but wants to avoid auction fraud. What are the four categories of auction fraud? a. failure to send, failure to disclose, sending to wrong address, failure to deliver b. failure to send, failure to disclose, sending something of lesser value, failure to deliver c. failure to disclose, sending something to wrong address, failure to send, failure to deliver d. failure to disclose, sending something of lesser value, failure to send, sending something of greater value

b. failure to send, failure to disclose, sending something of lesser value, failure to deliver

Clarence is a police detective with a small-town police department. He is trying to consider how seriously to take reports of cyber stalking. Why is cyber stalking a serious crime? a. it is frightening to the victim b. it can be a prelude to violent crime c. it is using interstate communication d. it can be a prelude to identity theft

b. it can be a prelude to violent crime

what made the Bagle virus so dangerous? a. it changed Windows Registry settings b. it disabled antivirus software c. it deleted key system files d. it corrupted the operating system

b. it disabled antivirus software

the most desirable approach to security is one that is which of the following? a. perimeter and dynamic b. layered and dynamic c. perimeter and static d. layered and static

b. layered and dynamic

which of the following virus attacks used a multimodal approach? (2 correct answers) a. slammer virus b. mimail virus c. sobig virus d. bagle virus

b. mimail virus c. sobig virus

Shelly is trying to teach new employees how to handle emailed security alerts. Which of the following is true regarding emailed security alerts? a. you must follow them b. most companies do not send alerts via email c. you can trust attachments on security alerts d. most companies send alerts via email

b. most companies do not send alerts via email

what is the top rule for chat room safety? a. make certain you have antivirus software installed b. never use your real name or any personal identifying characteristics c. only use chat rooms that encrypt transmissions d. use chat rooms that are sponsored by well-known websites or companies

b. never use your real name or any personal identifying characteristics

Which of the following is a device used to connect two or more networks? a. switch b. router c. hub d. NIC

b. router

what can you do with a firewall to help protect against virus attacks? a. there is nothing you can do on a firewall to help protect against a virus attack b. shut down all unneeded ports c. close all incoming ports d. none of the above are correct

b. shut down all unneeded ports

You have become quite active in online investing. You want to get some advice but are concerned about the veracity of the advice you receive. What is the most likely problem with unsolicited investment advice? a. you might not earn as much as claimed b. the advice might not be truly unbiased c. the advice might not be from a legitimate firm d. you might lose money

b. the advice might not be truly unbiased

How big is a TCP packet header? a. the size depends on the data being sent b. the size is always 20 bytes c. the size depends on the protocol being used d. the size is always 40 bytes

b. the size is always 20 bytes

internet addresses of the form www.chuckeasttom.com are called what? a. user-friendly web addresses b. uniform resource locators c. user-accessible web addresses d. uniform address identifiers

b. uniform resource locators

which of the following is the best definition of the term sensitive information? a. any information that has an impact on national security b. any information that is worth more than $1,000 c. Any information that if accessed by unauthorized personnel could damage your organization in any way d. any information that is protected by privacy laws

c. Any information that if accessed by unauthorized personnel could damage your organization in any way

what class of address is the IP address 193.44.34.127? a. A b. B c. C d. D

c. C

what protocol is used to send emails, and on what port does it work? a. SMTP, port 110 b. POP3, port 25 c. SMTP, port 25 d. POP3, port 110

c. SMTP, port 25

what type of defense depends on sending the client an incorrect SYN/ACK? a. stack tweaking b. RST cookies c. SYN cookies d. hash tweaking

c. SYN cookies

It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half open is a symptom of which type of attack? a. smurf attack b. partial attack c. SYN flood attack d. DDoS attack

c. SYN flood attack

what virus exploited buffer overflows? a. Sobig virus b. Mimail virus c. Sasser virus d. Bagle virus

c. Sasser virus

You are explaining the history of networking to a group of first-year students. What did Vince Cerf invent? a. The World Wide Web b. Email c. TCP d. the first computer virus

c. TCP

What is a penetration tester? a. a person who hacks a system without being caught b. a person who hacks a system by faking a legitimate password c. a person who hacks a system to test its vulnerabilities d. a person who is an amateur hacker

c. a person who hacks a system to test its vulnerabilities

what is war-driving? a. driving and seeking a computer job b. driving while using a wireless connection for hacking c. driving looking for wireless networks to hack d. driving and seeking rival hackers

c. driving looking for wireless networks to hack

according to the U.S Department of Justice, identity theft is generally motivated by what? a. malicious intent b. personal hostility toward the victim c. economic gain d. thrill seeking

c. economic gain

John is trying to simply connect three computers in a small network. He does not need any sort of routing capability and is not concerned about network traffic. What is the simplest device for connecting computers? a. NIC b. interface c. hub d. router

c. hub

Which of the following is the primary reason that Microsoft Outlook is so often a target for virus attacks? a. many hackers dislike Microsoft b. Outlook copies virus files faster c. it is easy to write programs that access Outlook's inner mechanisms d. Outlook is more commonly used than any other email systems

c. it is easy to write programs that access Outlook's inner mechanisms

if you are victim of cyber stalking, what should you do to assist the police? a. nothing; it is their job, and you should stay out of it b. attempt to lure the stalker into a public place c. keep electronic and hard copies of all harassing communications d. try to provoke the stalker into revealing personal information about himself

c. keep electronic and hard copies of all harassing communications

all DoS attacks are predicated on overwhelming a system's workload capacity. Therefore, measuring the workload of a system is critical. Which of the following is not a valid way to define a computer's workload? a. number of simultaneous users b. storage capacity c. maximum voltage d. speed of network connection

c. maximum voltage

what is the name for the point where the backbones of the internet connect? a. connectors b. routers c. network access points d. switches

c. network access points

What must exist for cyber stalking to be illegal in a state or territory? a. specific laws against cyber stalking in that state or territory b. specific laws against cyber stalking in that nation c. nothing; existing stalking laws can apply d. nothing; existing international cyber stalking laws apply

c. nothing; existing stalking laws can apply

the IP address 127.0.0.1 always refers to your what? a. nearest router b. ISP c. self d. nearest NAP

c. self

Juan is explaining various DoS attacks to security operators at his company. Which attack mentioned in this chapter causes a network to perform a DoS attack on one of its own servers? a. SYN flood b. ping of death c. smurf attack d. DDoS

c. smurf attack

which of the following is a major resource for detailed information on a computer virus? a. the MIT Virus Library b. the Microsoft Virus Library c. the F-Secure Virus Library d. the National Virus Repository

c. the F-Secure Virus Library

You want to make sure your team can identify the various DoS attack vectors. What type of attack uses the victim's own network routers to perform a DoS attack on the target? a. ping of death b. smurf attack c. slammer attack d. DDoS

d. DDoS

You are assigned with attaching connectors to segments of cable. What type of connector is used with network cables? a. RJ-11 b. RJ-85 c. RJ-12 d. RJ-45

d. RJ-45

what do law enforcement officials usually require of a victim in order to pursue harassment allegations? a. a verifiable threat of death or serious injury b. a credible threat of death or serious injury c. a verifiable threat of harm d. a credible threat of harm

d. a credible threat of harm

John is a network security administrator for a midsized college. He is trying to explain to a new hire what a virus is. Which of the following is the best definition of a virus? a. a program that causes harm on your computer b. a program used in a DoS attack c. a program that slows down networks d. a program that self-replicates

d. a program that self-replicates

No attack mitigation strategy is perfect, and you need to allow at least some traffic into and out of your network, or else your network is of no use. What can you do with your firewall to defend against at least some DoS attacks? a. block all incoming traffic b. block all incoming TCP packets c. block all incoming traffic on port 80 d. block all incoming ICMP packet

d. block all incoming ICMP packet

what can you do to your internal network routers to help defend against DoS attacks? a. disallow all traffic that is not encrypted b. disallow all traffic that comes from outside the network c. disallow all traffic that comes from inside the network d. disallow all traffic that comes from untrusted sources

d. disallow all traffic that comes from untrusted sources


Conjuntos de estudio relacionados

ATI Dosage Calculations Critical Care Medications 2nd

View Set

MIDTERM 2 - From Prejudice to Discrimination (3)

View Set

ATI - RN Nutrition Online Practice 2019 A

View Set

PMP 24 Quiz - Managing Procurement during Your Project

View Set

Structural Classification of Joints

View Set

Neurological Communication Disorders Exam 2

View Set

Chapter 7 | Survey Research (Exam 2)

View Set