350 CHP 4
_____ is a flaw in a program that permits a specific attack or set of attacks
A Vulnerability
________ is the general name for a security flaw in a program.
A Vulnerability
How did Target attackers obtain the stolen information?
A) Directly from the POS terminals B) From the vendor service server C) From the POS software download server D) NONE OF THESE
A spear phishing attack is usually aimed at ______?
An Individual
The Target attackers sold stolen card information to _______.
Card Shops
Which of the following were able to recoup most of the money they lost from Target?
Credit Card Companies
Which of the following can spread very rapidly?
Directly-propagating viruses
The Target attackers probably first broke into Target using the credentials of a(n) ______.
Employee in a firm outside Target
Users typically can eliminate a vulnerability in one of their programs by ________.
Installing a patch
The general term for evil software is ________
Malware
_____ is the most frequent type of company attack.
Malware
Which of the following probably suffered the most financial damage from the Target breach?
Retailers
In _____ thinking, the opponent is primarily an intelligent attacker.
Security
What kind of attack is most likely to succeed against a system with no technological vulnerabilities?
Social engineering
Viruses and worms propagate through _______.
Social engineering and exploiting vulnerabilities
For consumers who suffered credit card fraud because of the Target breach and acted quickly, which of the following is true?
The credit card companies did not charge them for fraudulent purchasers.
Which of the following attach themselves to other programs?
Viruses
Which of the following sometimes uses direct propagation between computers?
Worms
_______ are full programs
Worms
Vulnerability-based attacks that occur before a patch is available are called ________ attacks.
Zero-Day