Cyber Security test 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Identity theft is most often attempted in order to accomplish what goal? A) make illegal purchases B) discredit the victim C) avoid criminal prosecution D) invade privacy

A) make illegal purchases

An intrusion detection system is an example of: A) proactive security B) perimeter security C) hybrid security D) good security practices

A) proactive security

When a hacking technique uses persuasion and deception to get a person to provide information to help them compromise security, this is referred to as: A) social engineering B) conning C) human intel D) soft hacking

A) social engineering

What is malware? A) software that has some malicious purpose B) software that is not functioning properly C) software that damages your system D) software that is not properly configured for your system

A) software that has some malicious purpose

Which US government agency created the distributed network that formed the basis for the Internet?

A)Advanced Research Projects Agency (ARPA)

Why will protecting against Trojan horse attacks reduce DoS attacks? A. Because many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS B. Because if you can stop a Trojan horse attack, you will also stop DoS attacks C. Because a Trojan horse will often open ports allowing a DoS attack D. Because a Trojan horse attacks in much the same way as a DoS attack

A)Because many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS

Which layer of the OSI model is divided into two sublayers?

A)Data Link

What is the most common class of DoS attacks? A) Distributed Denial of Service B) Smurf attacks C) SYN floods D) Ping of Death

A)Distributed Denial of Service

What is the top way to protect yourself from cyber stalking? A. Do not use your real identity online. B. Always use a firewall. C. Always use a virus scanner. D. Do not give out email addresses.

A)Do not use your real identity online.

Protocol that translates web addresses into IP addresses

A)Domain Name Service (DNS)

Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud? A. Don't invest online. B. Consider the source of the offer. C. Always be skeptical. D. Always research the investment. B

A)Don't invest online.

What is the top rule for avoiding Internet fraud? A. If it seems too good to be true, it probably is. B. Never use your bank account numbers. C. Only work with people who have verifiable email addresses. D. Don't invest in foreign deals.

A)If it seems too good to be true, it probably is.

What factor about the Sobig virus made it most intriguing to security experts? A) It spread in multiple ways B) It deleted critical system files C) It was difficult to protect against D) It was very sophisticated

A)It spread in multiple ways

The TCP protocol operates at what layer of the OSI model?

A)Level 4: Transport

Which of the following is an example of a DDoS attack? A. MyDoom virus B. Bagle virus C. DoS virus D. Smurf virus

A)MyDoom virus

Which of the following was rated by many experts to be the fastest growing virus on the Internet? A. MyDoom virus B. Bagle virus C. Slammer virus D. Smurf virus

A)MyDoom virus

What is a NIC?

A)Network Interface Card

What is the first step in protecting yourself from identity theft? A. Never provide personal data about yourself unless absolutely necessary. B. Routinely check your records for signs of identity theft. C. Never use your real name on the Internet. D. Routinely check for spyware on your computer.

A)Never provide personal data about yourself unless absolutely necessary.

Which of the following is not an efficient method of protecting yourself from auction fraud? A. Only use auctions for inexpensive items. B. Only use reputable auction sites. C. Only work with well-rated sellers. D. Only bid on items that seem realistic.

A)Only use auctions for inexpensive items.

What type of attack is dependent on sending packets too large for the server to handle? A. Ping of death B. Smurf attack C. Slammer attack D. DDoS

A)Ping of death

What type of defense depends on changing the server so that unfinished handshaking times out sooner? A. Stack tweaking B. RST cookies C. SYN cookies D. Hash tweaking

A)Stack tweaking

What protocol is used for remotely logging on to a computer?

A)Telnet

Which of the following reasons most likely made the Bagle virus spread so rapidly? A) The e-mail containing to be from the system administrator B) It copied itself across the network C) It was a sophisticated virus D) It was particularly virulent

A)The e-mail containing to be from the system administrator

The cable used in networks is also referred to as what?

A)Unshielded twisted pair

What is the primary way a virus scanner works? A) by comparing files against a list of known virus profiles B) by blocking files that copy themselves C) by blocking all unknown files D) by looking at files for virus-like behavior

A)by comparing files against a list of known virus profiles

Which of the following is something a Trojan horse might do? A) open a back door for malicious software B) change your memory configuration C) change ports on your computer D) alter your IP address

A)open a back door for malicious software

what are the three approaches to security? A)perimeter,layered, hybrid B)High security, medium security, low security C)Internal,external, and hybrid D)Perimeter, complete, none

A)perimeter,layered, hybrid

What is the most common damage caused by virus attacks? A) slowing down networks by the virus traffic B) deleting files C) changing the Windows registry D) corrupting the operating system

A)slowing down networks by the virus traffic

Which of the following is the safest way to send and receive attachments? A) use a code word indicating the attachment is legitimate B) only send spreadsheet attachments C) use encryption D) use virus scanners before opening attachments

A)use a code word indicating the attachment is legitimate

According to a recent survey of 223 computer professionals prepared by the Computer Security Institute, which of the following was cited as an issue by more of the respondents? A. Internal systems B. Employee abuse C. Routers D. Internet connection

B) Employee abuse

What can you do with your firewall to defend against DoS attacks? A. Block all incoming traffic B. Block all incoming TCP packets C. Block all incoming traffic on port 80 D. Block all incoming ICMP packets

D)Block all incoming ICMP packets

What type of cable do most networks use?

D)Category 5

What type of attack uses Internet routers to perform a DoS on the target? A. Ping of death B. Smurf attack C. Slammer attack D. DDoS

D)DDoS

What can you do to your internal network routers to help defend against DoS attacks? A. Disallow all traffic that is not encrypted B. Disallow all traffic that comes from outside the network C. Disallow all traffic that comes from inside the network D. Disallow all traffic that comes from untrusted sources

D)Disallow all traffic that comes from untrusted sources

A defense that depends on a hash encryption being sent back to the requesting client is called: A) Stack tweaking B) RST cookies C) SYN cookies D) Hash tweaking

D)Hash tweaking

Spyware is: A) any software that monitors your system B) only software that logs keystrokes C) any software used to gather intelligence D) only software that monitors what web sites you visit

A) any software that monitors your system

Which of the following is the most basic security activity? A) authentication B) firewalls C) password protection D) auditing

A) authentication

The IP address of 127.0.0.1 always refers to your what?

C)self

What is one of the most common and simplest attacks on a system? A) Denial of service B) Buffer overflow C) Session hacking D) Password cracking

A) Denial of service

Why is it useful to have a separate credit card dedicated to online purchases? A. If the credit card number is used illegally, you will limit your financial liability. B. You can keep better track of your auction activities. C. If you are defrauded, you can possibly get the credit card company to handle the problem. D. You can easily cancel that single card, if you need to do so.

A) If the credit card number is used illegally, you will limit your financial liability.

A common Internet investment fraud is known as the: A) Nigerian Fraud B) Manhattan Fraud C) Pump and dump D) Bait and switch

A) Nigerian Fraud

What are three methods for protecting against SYN flood attacks? A) SYN cookies, RST cookies, and stack tweaking B) SYN cookies, DoS cookies, and stack tweaking C) DoS cookies, RST cookies, and stack deletion D) DoS cookies, SYN cookies, and stack deletion

A) SYN cookies, RST cookies, and stack tweaking

Tim Berners-Lee invented what ?

A) The World Wide Web

Which of the following virus attacks used a multi-modal approach? A) Slammer virus B) Mimail virus C) Sobig virus D) Bagle virus

B and C)Mimail virus and Sobig virus

Before you can formulate a defense for a network, you will need: A) appropriate security certifications B) a clear picture of the dangers to be defended against C) to finish this textbook D) the help of an outside consultant

B) A clear picture of the dangers to be defended against.

What is the basic mechanism behind a DoS attack? A) Computers don't handle TCP packets well B) Computers can only hand a finite load C) Computers cannot handle large volumes of TCP traffic D) Computers cannot handle large loads

B) Computers can only hand a finite load

What are the four categories of auction fraud? A) Failure to send, failure to disclose, sending to wrong address, failure to deliver in a timely manner. B) Failure to send, failure to disclose, sending something of lesser value, failure to deliver in a timely manner. C) Failure to disclose, sending money of greater value, failure to send, failure to deliver in a timely manner. D) Failure to disclose, sending something of lesser value, failure to send, sending something of greater value.

B) Failure to send, failure to disclose, sending something of lesser value, failure to deliver in a timely manner.

Why is cyber stalking a serious crime? A) It is frightening to the victim B) It can be a prelude to violent crime C) It is using interstate communication D) It can be a prelude to identity theft

B) It can be a prelude to violent crime

What can you do with a firewall to help protect against virus attacks? A) There is nothing you can do on the firewall to stop virus attacks B) Shut down all unneeded ports C) Close all incoming ports D) None of the above

B) Shut down all unneeded ports

What is the most likely problem with unsolicited investment advice? A) You might not earn as much as claimed B) The advice might not be truly unbiased C) The advice might not be from a legitimate firm D) You might lose money

B) The advice might not be truly unbiased

A computer virus is any: A) program that is downloaded to your system without your permission B) any program that self-replicates C) program that causes harm to your system D) program that can change your Windows registry

B) any program that self replicates

What is cyber stalking? A) any use of the Internet to send or post threats B) any use of electronic communications to stalk a person C) only use of e-mail to send threats D) only use of e-mail to stalk a person B) any use of electronic communications

B) any use of electronic communications to stalk a person

Submitting a fake but very high bid to deter other bidders is referred to as: A) bid siphoning B) bid shielding C) shill bidding D) ghost bidding

B) bid shielding

Which of the following is not one of the three major classes of threats? A) attempts to intrude on the system B) online auction fraud C) Denial of Service attacks D) a computer virus

B) online auction fraud

A T1 line sends data at what speed?

B)1.54Mbps

Which of the following is not a valid IP address ? A)127.0.0.1 B)295.253.254.01 C)127.256.5.2 D)245.200.11.1

B)295.253.254.01

What is a cookie? A. A piece of data that web servers gather about you B. A small file made that contains data and then is stored on your computer C. A piece of data that your web browser gathers about you D. A small file made that contains data and then is stored on the web server

B)A small file made that contains data and then is stored on your computer

Which of the following types of privacy law affects computer security? A. Any state privacy law B. Any privacy law applicable to your organization C. Any privacy law D. Any federal privacy law

B)Any privacy law applicable to your organization

The first computer incident-response team is affiliated with what university? A. Massachusetts Institute of Technology B. Carnegie-Mellon University C. Harvard University D. California Technical University

B)Carnegie-Mellon University

What protocol is used for web pages, and what port does it work on?

B)HTTP, port 80

Which utility gives you information about your machine's network configuration?

B)IPConfig

What made the Bagle virus so dangerous? A) It changed Windows registry settings B) It disabled antivirus software C) It deleted key system files D) It corrupted the operating system

B)It disabled antivirus software

A unique hexadecimal number that identifies your network card is called what?

B)MAC Address

Which of the following is true regarding e-mailed security alerts? A) You must follow them B) Most companies do not send alerts via email C) You can trust attachments on security alerts D) Most companies send alerts via e-email

B)Most companies do not send alerts via email

The top rule for chat room safety is what? A. Make certain you have antivirus software installed. B. Never use your real name or any real personally identifying characteristics. C. Only use chat rooms that encrypt transmissions. D. Use chat rooms that are sponsored by well-known websites or companies.

B)Never use your real name or any real personally identifying characteristics.

If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment? A. Yes; any threat of violence is harassment. B. Probably not because both parties are anonymous, so the threat is not credible. C. Yes; chat room threats are no different from threats in person. D. Probably not because making a chat room threat is not the same as making a threat in person.

B)Probably not because both parties are anonymous, so the threat is not credible.

A device used to connect two or more networks together is a what?

B)Router

How big is a TCP packet header?

B)The size is always 20 bytes

Internet addresses of the form www.chuckeasttom.com are called what?

B)Uniform Resource Locators (URL)

What is the most common way for a virus to spread? A) by copying to shared folders B) by e-email attachment C) by FTP D) corrupting the operating system

B)by e-email attachment

The most desirable approach to security is one that is which of the following? A. Perimeter and dynamic B. Layered and dynamic C. Perimeter and static D. Layered and static

B. Layered and dynamic

Which of the following is the best definition of the term sensitive information? A. Any information that has impact on national security B. Any information that is worth more than $1,000 C. Any information that if accessed by unauthorized personnel could damage your organization in any way D. Any information that is protected by privacy laws

C. Any information that if accessed by unauthorized personnel could damage your organization in any way

What will law enforcement officials usually require of the victim in order to pursue harassment allegations? A. A verifiable threat of death or serious injury B. A credible threat of death or serious injury C. A verifiable threat of harm D. A credible threat of harm

D)A credible threat of harm

Which of the following is not a valid way to define a computer's workload? A) Number of simultaneous users B) Storage capacity C) Maximum voltage D) Speed of network connection

C) Maximum voltage

Artificially inflating a stock in order to sell it at a higher value is referred to as: A) Bait and switch B) The Nigerian Fraud C) Pump and dump D) The Wall Street Fraud

C) Pump and dump

Leaving a connection half open is referred to as a: A) Smurf attack B) Partial attack C) SYN flood attack D) DDoS attack

C) SYN flood attack

Which attack mentioned in this chapter causes a network to perform a DoS on one of its own servers? A) SYN flood B) Ping of Death C) Smurf attack D) DDoS

C) Smurf attack

Vince Cerf Invented what

C) TCP

One extreme viewpoint about computer security is: A) the federal government will handle security B) Microsoft will handle security C) there are not imminent dangers to your system D) there is no danger if you use Linux

C) There are not imminent dangers to your system

What is the most common threat on the Internet? A) auction fraud B) hackers C) computer viruses D) illegal software

C) computer viruses

According to the U.S. Department of Justice, identity theft is generally motivated by: A) malicious intent B) personal hostility toward the victim C) economic gain D) thrill-seeking

C) economic gain

A seller bidding on her own item to drive up the price is referred to as: A) bid siphoning B) bid shielding C) shill bidding D) ghost bidding

C) shill bidding

what is a penetration tester ? A)A person who hacks a system without being caught B)A person who hacks a system by faking a legitimate password C)A person who hacks a system to test its vulnerabilities D) a person who is an amateur hacker

C)A person who hacks a system to test its vulnerabilities

What class would the IP address of 193.44.34.12 be? A)A B)B C)C D)D

C)C

What is war driving ? A) Driving and seeking a computer job B)Driving while using a wireless connection to hack C)Driving looking for a wireless networks to hack D)Driving and seeking rival hackers

C)Driving looking for a wireless networks to hack

The simplest device for connecting computers is called what?

C)Hub

What was most interesting to security experts about the Mimail virus? A) It spread more rapidly than other virus attacks B) It spread in multiple ways C) It grabbed e-mail addresses from documents on the hard drive D) It deleted critical system files

C)It grabbed e-mail addresses from documents on the hard drive

Which of the following is the primary reason that Microsoft Outlook is so often a target for virus attacks? A) Many hackers dislike Microsoft B) Outlook copies virus files faster C) It is easy to write programs that access Outlook's inner mechanisms D) Outlook is more common than other e-mail systems

C)It is easy to write programs that access Outlook's inner mechanisms

If you are a victim of cyber stalking, what should you do to assist the police? A. Nothing; it is their job and you should stay out of it. B. Attempt to lure the stalker into a public place. C. Keep electronic and hard copies of all harassing communications. D. Try to provoke the stalker into revealing personal information about himself.

C)Keep electronic and hard copies of all harassing communications.

The point where the backbones of the Internet connect is called what?

C)Network access points

What must exist for cyber stalking to be illegal in a state or territory? A. Specific laws against cyber stalking in that state or territory. B. Specific laws against cyber stalking in that nation. C. Nothing; existing stalking laws can apply. D. Nothing; existing international cyber stalking laws apply.

C)Nothing; existing stalking laws can apply.

What protocol is used to send email, and on what port does it work?

C)SMTP, port 25

What type of defense depends on sending the client an incorrect SYNACK? A. Stack tweaking B. RST cookies C. SYN cookies D. Hash tweaking

C)SYN cookies

What virus exploited buffer overflows? A) Sobig virus B) Mimail virus C) Sasser virus D) Bagle virus

C)Sasser virus

What can you do on your local computer to protect your privacy? A. Install a virus scanner. B. Install a firewall. C. Set your browser's security settings. D. Set your computer's filter settings.

C)Set your browser's security settings.

Which of the following is a major resource for detailed information on a computer virus? A. The MIT Virus Library B. The Microsoft Virus Library C. The F-Secure Virus Library D. The National Virus Repository

C. The F-Secure Virus Library

What percentage of cyber stalking cases escalate to real-world violence? A. Less than 1% B. 25% C. 90% or more D. About 19%

D)About 19%

What do you call a DoS launched from several machines simultaneously? A) Wide-area attack B) Smurf attack C) SYN flood D) DDoS attack

D) DDoS attack

What is the most significant weakness in a DoS attack from the attacker's viewpoint? A) The attack is often unsuccessful B) The attack is difficult to execute C) The attack is easy to stop D) The attack must be sustained

D) The attack must be sustained

What is the term for hacking a phone system ? A)Telco-hacking B)Hacking C)Cracking D)Phreaking

D) phreaking

How can securing internal routers help protect against DoS attacks? A. Attacks cannot occur if your internal router is secured. B. Because attacks originate outside your network, securing internal routers cannot help protect you against DoS. C. Securing the router will only stop router-based DoS attacks. D. It will prevent an attack from propagating across network segments.

D)It will prevent an attack from propagating across network segments.

The connector used with network cables is called what?

D)RJ-45

What other way can a virus scanner work? A) by comparing files against a list of known virus profiles B) by blocking files that copy themselves C) by blocking all unknown files D) by looking at files for virus-like behavior

D)by looking at files for virus-like behavior

Which of the following is a step that all computer users should take to protect against virus attacks? A) purchase and configure a firewall B) shut down all incoming ports C) use non-standard e-mail clients D) install and use antivirus software

D)install and use antivirus software

Which of the following is a way that any person can use to protect against virus attacks? A) set up a firewall B) use encrypted transmissions C) use secure e-mail software D) never open unknown e-mail attachments

D)never open unknown e-mail attachments

Which of the following is the best definition of virus? A) program that causes harm on your computer B) program used in a DoS attack C) program that slows down networks D) program that self-replicates

D)program that self-replicates

What is a buffer overflow attack? A) overflowing a port with too many packets B) putting more e-mail in an e-mail system than it can hold C) overflowing the system D) putting more data in a buffer than it can hold

D)putting more data in a buffer than it can hold

A key logger is what type of malware? A) virus B) buffer overflow C) Trojan horse D) spyware

D)spyware


संबंधित स्टडी सेट्स

Chapter 60: Assessment of Integumentary Function

View Set

Scarcity and Opportunity Cost The Economic Problem

View Set

Section 6. Pt.2: Environmental Concerns and Disclosures in DE

View Set