Security Test 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What ranges for the first number in an IP address are for A-E?

A: 0-126, B: 128 - 191, C: 192 - 223, D: 224 - 247, E: 248 - 255

Why will protecting against Trojan horse attacks reduce DoS attacks?

Because many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS

Which of the following was one of the three universities involved in the original distributed network setup by a government agency?

Berkeley

Submitting a fake but very high bid to deter other bidders is referred to as what?

Bid shielding

What can you do with your firewall to defend against DoS attacks?

Block all incoming ICMP packets

What is historically the most common way for a virus to spread?

By email attachment

What do you call a DoS launched from several machines simultaneously?

DDos attack

Translates URLs into Web addresses

DNS (Domain Name Service)

Which layer of the OSI model is divided into two sublayers?

Data Link

What factor about the Sobig virus made it most intriguing to security experts?

It spread in multiple ways

What protocol is used for web pages, and what port does it work on?

HTTP, port 80

If you are a victim of cyber stalking, what should you do to assist the police?

Keep electronic and printed copies of all harassing communications

The most desirable approach to security is one that is:

Layered and Dynamic

The TCP protocol operates at what layer of the OSI model?

Level 4: Transport

Be able to identify invalid IP addresses

Look at the first number. If it is not 0 - 255 then it is not a valid IP address

A unique hexadecimal number that identifies your network card is called what?

MAC Address

What are three methods for protecting against SYN flood attacks?

SYN cookies, RST cookies, and stack tweaking

Leaving a connection half open is referred to as what?

SYN flood attack

What virus exploited buffer overflows?

Sasser virus

Which of the following is something a Trojan horse might do?

Open a back door for malicious software

What are the three approaches to security?

Perimeter, Layered, and Hybrid

What is the term for hacking a phone system?

Phreaking

An intrusion-detection system is an example of which of the following?

Proactive Security

Which of the following is the best definition of "virus"

Program that self-replicates

Artificially inflating a stock in order to sell it at a higher value is referred to as what?

Pump and Dump

What is a buffer-overflow attack?

Putting more data in a buffer than it can hold

The connector used with network cables is called what?

RJ-45

A device used to connect two or more networks together is a what?

Router

What protocol is used to send email, and on what port does it work?

SMTP, port 25

A seller (on an online auction site) bidding on his or her own items to drive up the price is referred to as what?

Shill bidding

What can you do with a firewall to help protect against virus attack?

Shut down all unneeded ports

Which of the following virus attacks used a multimodal approach?

Sobig virus

When a hacking technique uses persuasion and deception

Social Engineering

What is malware?

Software that has some malicious purpose

A key logger is what type of virus?

Spyware

What type of defense depends on changing the server so that unfinished handshaking times out sooner?

Stack tweaking

Vince Cerf created:

TCP?

What protocol is used for remotely logging on to a computer?

Telnet

The most common Internet investment fraud is known as what?

The Nigerian fraud

How big is a TCP packet header?

The size is always 20 bytes

One extreme viewpoint about computer security is what?

There are no imminent dangers to your system

Internet addresses of the form www.google.com are called what?

Uniform Resource Locators (URL)

The cable used in networks is also referred to as what?

Unshielded twisted pair

Tim Berners-Lee invented:

World Wide Web

The IP address of 127.0.0.1 always refers to your what?

Yourself

A T1 line sends data at what speed?

1.54Mbps

What percentage of cyber stalking cases escalate to real-world violence?

19%

Before you can formulate a defense for a network you need what?

A clear picture of the dangers to be defended against

What is a sneaker?

A person who hacks a system to test its vulnerabilities

What is a cookie?

A small file made that contains data and then is stored on your computer

Which US government agency created the distributed network that formed the basis for the Internet?

Advanced Research Projects Agency (ARPA)

Definition of sensitive information

Any information that if accessed by unauthorized personnel could damage your organization in any way

What is a computer virus?

Any program that self-replicates

What is spyware?

Any software that monitors your system

What is the most basic security activity?

Authentication

The first computer incident-response team is affiliated with what university?

Carnegie-Mellon University

What type of cable do most networks use?

Category 5

What is the most common threat on the Internet?

Computer viruses

What is the CIA triad?

Confidentiality, Integrity, Availability

What is war-driving?

Driving looking for wireless networks to hack

According to the U.S. Department of Justice, identity theft is usually motivated by what?

Economic gain

According to a recent survey of 223 computer professionals prepared by the Computer Security Institute, which of the following was cited as an issue by more of the respondents?

Employee abuse

Major resource for detailed information on computer viruses:

F-Secure Virus Library

The simplest device for connecting computers is called what?

Hub

Which utility gives you information about your machine's network configuration?

IPConfig

Why is cyber stalking a serious crime?

It can be a prelude to violent crime

What was most interesting to security experts about the Mimail virus?

It grabbed email addresses from documents on the hard drive

Which of the following is a real-life example of a DDoS attack?

MyDoom virus

What is a NIC?

Network Interface Card

The point where the backbones of the Internet connect is called what?

Network access points

What is the first step in protecting yourself from identity theft?

Never provide any personal data about yourself unless absolutely necessary


Set pelajaran terkait

Deferred Compensation (ISOs and NQSOs)

View Set

Texas Real Estate Finance - Chapter 1

View Set

Chapter 21 Revolutions and Nation Building, 1848-1871

View Set

Foundations of Management Test #1

View Set

Massage Therapy Test - Head, Neck & Face

View Set

ACC2100-112 - Chapter 1A Smartbook

View Set

The Ultimate Subject/Verb Agreement Review

View Set

Silvestri Comprehensive Review for the NCLEX-PN® Exam, 7th Edition - Safety Flashcard Set

View Set