CSS1005: CHAPTER 3
Which of the following security countermeasures is best for end-point protection against malware?
Antivirus/anti-malware protection, data leakage prevention, standardized workstation and laptop images, security awareness training
Which type of malware involves extorting the user or organization into paying money to release a decryption key?
Cryptolocker malware
Which of the following impacts availability?
DDoS
Which type of attacks recult in legitimate users nt having access ti a system resource?
DDoS
Which of the following is an example of social engineering?
Impersonation
A(n)...is a software tool that is used to capture packets from a network.
Packet sniffer
Which type if attack involves capturing data packets from a network and transmitting them later to produce unauthorized effect?
Replay
Which of the following terms best describes a person with a very little hacking skills?
Script kiddie
Which of the following best describes intellectual property?
The items a business has copyrighted, all patents owned by the business, the unique knowledge a business possesses, customer lists
A(n)... is any action that could damage an asset.
Threat
The main goal of a hacker is to steal or compromise IT assets and potentially steal data.
True
A(n)... is any weakness that makes it possible for a threat to cause harm to a computer or network.
Vulnerability
Which type of malware is a self-contained program that replicates and sends copies of itself to other computers, generally across a network?
Worm
A SYN flood attack floods a target with invalid or half-open TCP connection requests.
true
War driving involves looking for open or public wireless networks
true