Guide to Network Defense and Countermeasures CH. 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

mandatory access control

With which access control method do system administrators establish what information users can share?

challenge/response

In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

botnet

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

False

Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.

True

Physical security protects a system from theft, fire, or environmental disaster.

open sockets

What can an attacker use a port scanner to test for on a target computer?

secure remote access

What is a VPN typically used for?

use DoS attacks on Web sites with which they disagree

A hactivist can best be described as which of the following?

True

A worm creates files that copy themselves repeatedly and consume disk space.

Trojan

What is a program that appears to do something useful but is actually malware?

VPN

What tool do you use to secure remote access by users who utilize the Internet?

checksum

Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

impartiality

Which of the following is NOT one of the three primary goals of information security?

macro

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

authentication

Which security layer verifies the identity of a user, service, or computer?

social engineering

Which term is best described as an attack that relies on the gullibility of people?

RPC attacks

Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?

man-in-the-middle

Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

so a user can't deny sending or receiving a communication

Why might you want your security system to provide nonrepudiation?

True

With discretionary access control, network users can share information with other users, making it more risky than MAC.


Ensembles d'études connexes

Chapter 10: Small Group Communication

View Set

name the quadrilateral- parallelogram, rhombus, square, rectangle- for which the statement is ALWAYS true

View Set