CIST1601- Exam 2 - Chapters 3, 4, and 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

41. A program that looks benign but actually has a malicious purpose is a _______. A) Trojan horse B) Virus C) Worm D) Cookie

A) Trojan horse

18. Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address, causing the network to perform a DoS attack on one of more of its member servers? A) Stack tweaking B) RST cookies C) Smurf IP attack D) None of the above

C) Smurf IP attack

22. One tool used for a denial-of-service attack is ______________. A) Linux B) Tribal Flood Network C) UDP D) None of the above

C) UDP

6. A file on your computer that websites use to store information about you is a _________. A) Cookie B) Browser C) Tab D) None of the above

A) Cookie

5. Which of the following involves using the Internet to harass, threaten, or intimidate another person? A) Cyberstalking B) Looping C) Phishing D) Licensing

A) Cyberstalking

16. Which type of attack attempts to overload the system with requests, denying legitimate users access? A) Denial of service B) ip spoofing C) Phishing D) None of the above

A) Denial of service

7. Which of the following is one way to protect yourself against identity theft? A) Do not provide personal information to anyone if it is not absolutely necessary. B) Use Firefox as your web browser. C) Use Windows as your operating system. D) None of the above.

A) Do not provide personal information to anyone if it is not absolutely necessary.

15. One way to protect yourself on auction sites is _____________. A) Use a separate credit card with a low limit. B) Bid late in the process. C) Bid early in the process. D) None of the above.

A) Use a separate credit card with a low limit.

43. Any file that can self-replicate is a ________. A) Virus B) Worm C) Trojan horse D) None of the above

A) Virus

30. One classic denial-of-service attack distributed by email was _____________. A) myDoom B) Linux C) pingflood D) None of the above

A) myDoom

1. Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price? A) Shill bidding B) Bid shielding C) Bid siphoning D) None of the above

B) Bid shielding

2. Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price? A) Shill bidding B) Bid shielding C) Bid siphoning D) None of the above

B) Bid shielding

4. Which of the following is the process to try to induce someone to provide you with personal information? A) Cyberstalking B) Looping C) Phishing D) Licensing

C) Phishing

24. The command-line command to display all options for the ping command is ping ____. A) -h B) -i C) -j D) none of the above

A) -h

29. One defense against denial-of-service attacks is to _______ ICMP packets. A) Block B) Convert C) Permit D) Modify

A) Block

44. If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack. A) Buffer-overflow B) RAM C) Spyware D) Adware

A) Buffer-overflow

38. The virus/worm that collected email addresses from your address book and from other documents on your machine was the ________ virus. A) Mimail B) Bagle C) Nonvirus D) None of the above

A) Mimail

14. When using a chat room, one way to protect yourself from online harassment is ______. A) Not to use your real name B) Not to use the chat room at night C) Not to say too much in the chat room D) None of the above

A) Not to use your real name

19. Which defensive technique involves altering the TCP stack on the server so that it will take less time to timeout when a SYN connection is left incomplete? A) Stack tweaking B) RST cookies C) SYN cookies D) None of the above

A) Stack tweaking

20. Micro blocks, SYN cookies, RST cookies, and stack tweaking are defenses against ______. A) TCP SYN flood attacks B) Phishing C) Viruses D) None of the above

A) TCP SYN flood attacks

27. The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack. A) Teardrop B) Land C) myDoom D) echo-chargen

A) Teardrop

10. Why should a cybercrime law be specific? A) To prevent defendants from finding loopholes B) So it will be internationally recognized C) So that multiple laws will not be necessary D) None of the above

A) To prevent defendants from finding loopholes

34. The virus/worm that attempts to copy itself to C:\WINDOWS\FVProtect.exe is _______. A) W32/Netsky-P B) Troj/Invo-Zip C) MacDefender D) Sobig

A) W32/Netsky-P

32. The Microsoft Office suite is a tempting target for viruses because ___________. A) It is so ubiquitous. B) It is designed so that legitimate programmers can access its internal objects. C) It contains virus programming tools. D) None of the above.

B) It is designed so that legitimate programmers can access its internal objects.

26. The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself is a(n) _______________ attack. A) Teardrop B) Land C) myDoom D) echo-chargen

B) Land

12. The recommended Internet Explorer privacy setting is _________. A) Medium B) Medium high C) Very high D) None of the above

B) Medium high

28. The attack in which the attacker sends a packet that is too large and can shut down a target machine is a(n) ________________ attack. A) ICMP flood B) Ping of Death C) Teardrop D) None of the above

B) Ping of Death

17. Which defensive technique involves the server sending a wrong SYN+ACK to the client, so the client sends and RST packet notifying the server of an error? This makes the server think the client request is legitimate. A) Stack tweaking B) RST cookies C) SYN cookies D) None of the above

B) RST cookies

31. The most common way for a virus to spread is by __________. A) Use of your email contacts B) Scanning your computer for network connections and copying itself to other machines on the network C) Locating Linux machines D) None of the above

B) Scanning your computer for network connections and copying itself to other machines on the network

35. The virus/worm transmitted in a zip file attached to an email with an enticing message is __________. A) W32/Netsky-P B) Troj/Invo-Zip C) MacDefender D) None of the above

B) Troj/Invo-Zip

13. Firefox and Internet Explorer are examples of ____________. A) Cookies B) Web browsers C) Websites D) Proxy servers

B) Web browsers

37. The virus/worm that specifically targets Linux computers is ________. A) W32/Netsky-P B) Troj/Invo-Zip C) MacDefender D) None of the above

D) None of the above

8. Which country is described by experts as having the strictest cybercrime laws? A) United States B) Russia C) France D) None of the above

D) None of the above

42. McAfee and Norton are examples of ________. A) Viruses B) Worms C) Trojan horses D) Virus scanners

D) Virus scanners

25. The command-line command to instruct the ping utility to send packets until explicitly told to stop is ping ____. A) -s B) -t C) -u D) None of the above

B) -t

39. The virus/worm that combined email attachments along with a fake virus warning was the __________ virus. A) Mimail B) Bagle C) Nonvirus D) None of the above

B) Bagle

3. Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price? A) Shill bidding B) Bid shielding C) Bid siphoning D) None of the above

C) Bid siphoning

23. _________ attacks are becoming less common in modern operating systems. A) Denial of service B) SYN flood C) Buffer overflow D) None of the above

C) Buffer overflow

9. Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose? A) Phishing B) Browsing C) Harassment D) None of the above

C) Harassment

11. _____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception. A) Cyber B) Neutral C) Identity D) None of the above

C) Identity

33. The I Love You virus caused harm because ________. A) It had a negative payload. B) It erased data on computers. C) It generated large numbers of emails that bogged down many networks. D) None of the above.

C) It generated large numbers of emails that bogged down many networks.

36. The virus/worm that specifically targets Macintosh computers is ________. A) W32/Netsky-P B) Troj/Invo-Zip C) MacDefender D) None of the above

C) MacDefender

40. The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus. A) Mimail B) Bagle C) Nonvirus D) None of the above

C) Nonvirus

21. The command-line command _______ 127.0.0.1 -l 65000 -w 0 -t will send multiple large packets to a computer, and when initiated by multiple senders may cause a denial-of-service attack. A) dos B) ddos C) tfn D) None of the above

D) None of the above


संबंधित स्टडी सेट्स

Regional And Interregional interactions

View Set

Exam #3 - Biology the World and Us

View Set

Psychology Final Exam REAL QUESTIONS

View Set

PSYCH 7A CHAPTER 14: SOCIAL PSYCHOLOGY

View Set

Mastering Bio - Membrane structure and function

View Set

U60: World War I Begins: Practice quiz

View Set

BSCC 1084 Exam 2 Study Ch 9 - 16

View Set