CSCI 290 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A screening firewall works in application layer of the OSI model?

False

An on-demand virus scanner runs in the background and is constantly checking you PC

False

The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence?

False

netstat is a command you can use with a forensic copy of a machine to compare two files

False

www.yahoo.people.com is the website from Yahoo! people search

False

What is the term for a fake system designed to lure intruders?

Honey Pot

What should you be most careful of when looking for an encryption method to use?

How long the algorithm has been around

A discarded credit card receipt or utility bill could be starting point from which a perpetrator finds enough information to assume a victim's

Identity

You would set a ___ to prevent users from immediately changing their password several times in one day to the current password.

Minimum password age

On a server, you should create your own accounts with ____ that do not reflect their level of permission.

Names

What is the term for a firewall that is simply software installed on an existing server?

Network host based

Which of the following is most true regarding encryption methods?

Never Use them until they have been proven

In 1998, ethnic Tami Guerrillas swamped ____ embassies with 800 emails a day

Sri Lankan

The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems

Stuxnet

Hackers want information about a target person, organization, and ____ to assist in compromising security

System

What are TSR programs?

Terminate and Stay resident programs that actually stay in memory after you shut them down

Which of the following is an activity that falls into a gray area and might be acceptable internet use in some organizations but not others?

Online shopping during a break

Which of the following is methods is available as an add-in for most email clients?

PGP

The first rule of computer security is to check ____

Patches

Any ____ you do not explicitly need should be shut down

Ports

What is the term for blocking an IP address that has been the source of suspicious activity

Preemptive Blocking

What type of encryption uses different keys to encrypt and decrypt the message?

Public Key

The Rule that packets not originating from inside your LAN should not be forwarded related to ___

Routers

A document that defines how an organization deals with some aspect of security is a

Security Policy

New employees should receive a copy of the company's ___ policies

Security/acceptable use

Many states have online ____ registries

Sex offender

A discarded credit card receipt may become the starting point from which an identity fraud perpetrator finds enough information to assume the victim's identity

True

A virtual private network is a way to use the internet to create a connection between a remove user and central location?

True

CNE, MCITP, CISSP, and CCNA are examples of industry certifications?

True

CNE, MCITP, and CONA are examples of industry certifications

True

Cyberterrorism is the use of computers and the internet connectivity between them to launch a terrorist attack

True

Experience is the most important factor when looking for a security professional

True

Information warfare is any attempt to manipulate information in pursuit of a military or political goal.

True

Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user's machine?

True

Microsoft baseline security analyzer (MBSA) checks one or more windows machines to see if they have basic security in place

True

One technique of disinformation is to pad a message with noise that the enemy will perceive as valuable information

True

Public Key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of key?

True

The U.S. Patriot Act specifically deals with cyberterrorism

True

There are no restrictions on information you can post on usenet

True

There should be a firewall between your network and outside world.

True

Windows Logging can be turned on and off with a tool called auditpol.exe.

True

the windows registry contains a list of USB devices that have been connected to the machine

True

Microsoft Baseline Security (MBSA) checks one or more windows machines to see if they have basic security in place?

TrueC

The joint task force representing components of all four U.S. armed services is the

U.S. Cyber Command

When an employee leaves, all ____ should be terminated

logins

using linux to backup your hard drive, if you want to create a hash, you would use the command-line command

md5sum

you can use the service Yahoo!people search by going to

people.yahoo.com

The linux log file that contains activity related to the web server is ____

/var/log/apache 2/

the linux log file that can reveal attempts to compromise the system to the presence of a virus or spyware is ____

/var/log/apport.log

What size key does a DES system use?

56 bit

A good password has at least ____ characters?

8

What method do most IDS software implementations use?

Anomaly Detection

Which binary mathematical operation can be used for a simple encryption method?

Bit shift

How do most Anti-spyware package work?

By looking for known spyware

How do most anti spyware packages work?

By looking for known spyware

Which of the following is the oldest encryption method discussed in this text?

Caesar Cipher

Chinese hackers whose stated goal is to infiltrate western computer systems are called the

China Eagle Union

_____ is the premeditated, politically motivated attack against information computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents

CyberterrorismAn

A _____ involves setting up two firewalls: an outer and inner

DMZ

the background, screensaver, font size, and resolution are elements of

Desktop configuration

An ____ attack on data can include stealing or destroying data

Economic

____ is the most obvious reason for organizations to provide their users with internet access

Emergency Comms

Windows stores info on web address, search queries, and recently opened files in a file called ____

index.dat

Using Linux to wipe the target drive, the command-line command would be___

dd

In windows the log that contains events collected from remote computers is the _____ log

forwarded events

there have been cases of mistaken identity ___ lists

sex offender

frequently the first responder to a computer crime is ___

the network administrator

If you determine a virus has struck a system, the first step is to ___

unplug the machines from the network

_____ is a global group of bulletin exist on any subject you can imagine

usenet

A website that may help locate federal prison records is ___

www.bop.gov/


Ensembles d'études connexes

Chapter 46: Mgt With Gastric and Duodenal Disorders - ML8

View Set

Public Speaking Final: Pocket Guide

View Set

Tennessee life and health final exam

View Set

Indians on the Great Plains Homework

View Set

Module 1 Introduction to Programming Exam

View Set

La letra H siempre se escribe con una variedad de prefijos

View Set