Chapter1 CISS 320
What is a program that appears to do something useful but is actually malware?
Trojan
What tool do you use to secure remote access by users who utilize the Internet?
VPN
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
macro
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
man-in-the-middle
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?
RPC attacks
Defense in depth can best be described as which of the following?
a layered approach to security
What can an attacker use a port scanner to test for on a target computer?
open sockets
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
quarantine
What is a VPN typically used for?
secure remote access
Which term is best described as an attack that relies on the gullibility of people?
social engineering
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?
IDPS
Which security layer verifies the identity of a user, service, or computer?
authentication
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
botnet
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
challenge/response
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?
checksum