Module 17 Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?

A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.

George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of "file" and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George's workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?

Access attack

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?

DoS (denial of service)

Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. Which type of attack is described in this scenario?

Malware attack

Angela, an IT staff member at ACME Inc., notices that communication with the company's web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME'S web server. What type of attack is described in this scenario?

denial of service attack (DoS)

What kind of threat is described when a threat actor prevents legal users from accessing data services?

disruption of service

What kind of threat is described when a threat actor is stealing the user database of a company?

information theft

What kind of threat is described when a threat actor steals scientific research data?

information theft

What are two ways to protect a computer from malware? (Choose two.)

keep software up to date, use antivirus software

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah's computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?

malware attack


Kaugnay na mga set ng pag-aaral

Management Chapter 2 Assignment Notes

View Set

Human Anatomy and Physiology I- Chapter 17 Homework

View Set