Prior Knowledge Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A packet monkey is an unskilled programmer who spreads viruses to victims. TRUE OR FALSE

FALSE

Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.

FALSE

Which security tool works by recognizing signs of a possible attack and sending notification to an administrator? DiD DMZ IDPS VPN

IDPS

What is a VPN typically used for? secure remote access block open ports detection of security threats filter harmful scripts

secure remote access

________ events usually track the operations of the firewall or IDPS, making a log entry whenever it starts or shuts down.

System

What is a program that appears to do something useful but is actually malware? logic bomb back door virus Correct! Trojan

TROJAN

A worm creates files that copy themselves repeatedly and consume disk space. TRUE OR FALSE

TRUE

Physical security protects a system from theft, fire, or environmental disaster. TRUE OR FALSE

TRUE

With discretionary access control, network users can share information with other users, making it more risky than MAC.

TRUE

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following? Trojan logic bomb packet monkey Correct! botnet

BOTNET

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus? Trojan Correct! macro back door worm

MACRO

______________________ is the capability to prevent a participant in an electronic transaction from denying that it performed an action.

Nonrepudiation

What can an attacker use a port scanner to test for on a target computer? open sockets ping floods SYN flags invalid IP addresses

OPEN SOCKETS

A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.

PORT

Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port? ICMP message abuse malicious port scanning SYN flood RPC attacks

RPC attacks

Which term is best described as an attack that relies on the gullibility or trust of people? malicious code script kiddie back door social engineering

SOCIAL ENGINEERING

________________ are spread by several methods, including running executable code, sharing disks or memory sticks, opening e-mail attachments, and viewing infected or malicious Web pages.

Viruses

______________ do not require user intervention to be launched; they are self-propagating.

Worms

Defense in depth can best be described as which of the following? a layered approach to security authentication and encryption antivirus software and firewalls a firewall that protects the network and the servers

a layered approach to security

Which security layer verifies the identity of a user, service, or computer? authentication repudiation physical security authorization

authentication

In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated? signature challenge/response basic biometrics

challenge/response

Which of the following is NOT information that a packet filter uses to determine whether to block a packet? checksum protocol port IP address

checksum

Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications? man-in-the-middle malicious port scanning remote procedure call denial of service

man-in-the-middle

Which of the following is NOT one of the three primary goals of information security? impartiality confidentiality integrity availability

impartiality

What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files? recycle bin demilitarized zone firewall quarantine

quarantine

Which type of firewall policy calls for a firewall to deny all traffic by default? demilitarized policy perimeter policy permissive policy restrictive policy

restrictive policy

Why might you want your security system to provide nonrepudiation? to prevent an unauthorized user from logging into the system to trace the origin of a worm spread through email Correct! so a user can't deny sending or receiving a communication to prevent a user from capturing packets and viewing sensitive information

so a user can't deny sending or receiving a communication

A hactivist can best be described as which of the following? use DoS attacks on Web sites with which they disagree an unskilled programmer that spreads malicious scripts deface Web sites by leaving messages for their friends to read consider themselves seekers of knowledge

use DoS attacks on Web sites with which they disagree


संबंधित स्टडी सेट्स

Real Estate, Chapter 2, Section 3 (Leasehold Estates), Pop Quiz Questions 3.1

View Set

Multinational Finance: Financial Goals and Corporate Governance

View Set