Guide to Network Defense and Countermeasures CH. 1
mandatory access control
With which access control method do system administrators establish what information users can share?
challenge/response
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
botnet
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
False
Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
True
Physical security protects a system from theft, fire, or environmental disaster.
open sockets
What can an attacker use a port scanner to test for on a target computer?
secure remote access
What is a VPN typically used for?
use DoS attacks on Web sites with which they disagree
A hactivist can best be described as which of the following?
True
A worm creates files that copy themselves repeatedly and consume disk space.
Trojan
What is a program that appears to do something useful but is actually malware?
VPN
What tool do you use to secure remote access by users who utilize the Internet?
checksum
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?
impartiality
Which of the following is NOT one of the three primary goals of information security?
macro
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
authentication
Which security layer verifies the identity of a user, service, or computer?
social engineering
Which term is best described as an attack that relies on the gullibility of people?
RPC attacks
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?
man-in-the-middle
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
so a user can't deny sending or receiving a communication
Why might you want your security system to provide nonrepudiation?
True
With discretionary access control, network users can share information with other users, making it more risky than MAC.