CIT 184 - Chapter One Quiz
A hacktivist can best be described as what?
Use DoS attacks on web sites with which they disagree.
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?
IDPS
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
Macro
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
Quarantine
Computer files that copy themselves repeatedly and consume disk space or other resources.
Worm.
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
Man-in-the-Middle
With which access control method do system administrators establish what information users can share?
Mandatory Access Control
What can an attacker use a port scanner to test for on a target computer?
Open Sockets
Hardware or software tools that allow or deny packets based on specified criteria, such as port, IP address or protocol.
Packet Filters.
An area in random access memory (RAM) reserved for the use of a program that "listens" for requests for the service it provides.
Port.
An access control method that establishes organizational roles to control access to information.
RBAC.
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?
RPC Attacks
Which type of firewall policy calls for a firewall to deny all traffic by default?
Restrictive Policy
What is VPN typically used for?
Secure Remote Access
Signs of possible attacks that include an IP address, a port number, and the frequency of access attempts; an IDPS uses signatures to detect possible attacks.
Signatures.
Why might you want your security system to provide nonrepudiation?
So a user can't deny sending or receiving a communication.
Which term is best described as an attack that relies on the gullibility of people?
Social Engineering
A network connection consisting of a port number combined with a computer's IP address.
Socket.
What is a program that appears to do something useful but is actually malware?
Trojan
T/F: A worm creates files that copy themselves repeatedly and consume disk space
True
T/F: Physical security protects a system from theft, fire, or environmental disaster.
True
T/F: With discretionary access control, network users can share information with other users, making it more risky than MAC.
True
What tool do you use to secure remote access by users who utilize the Internet?
VPN
Defense in depth can best be described as which of the following?
A layered approach to security.
The process of recording which computers are accessing a network and what resources are being accessed, and then recording the information in a log file.
Auditing.
Which security layer verifies the identity of a user, service, or computer?
Authentication
A method of authenticating a user using physical information, such as retinal scans, fingerprints, or voiceprints.
Biometrics.
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
Botnet
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
Challenge/Response
Which of the following is NOT information that a packet filter uses to determine whether to block a packet? IP Address Checksum Protocol Port
Checksum
An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all, and normal traffic is blocked.
DDoS Attack.
A semi trusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN.
DMZ.
T/F: A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses.
False
T/F: Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
False