Finals (Chapters 10 - 12)
In information technology, perhaps the best-known ISO standard is the Open Systems Interconnection (OSI) Reference Model. This internationally accepted framework of standards governs how separate computer systems communicate using networks. A. True B. False
A. True
Many Trojans spread through e-mail messages or Web site downloads. A. True B. False
A. True
One of the OSI Reference Model layers, the Network Layer, is responsible for the logical implementation of the network. A. True B. False
A. True
The International Electrotechnical Commission (IEC) is the predominant organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes. A. True B. False
A. True
The OSI Reference Model is a theoretical model of networking with interchangeable layers. A. True B. False
A. True
The Payment Card Industry Data Security Standard (PCI DSS) is an international standard for handling transactions involving payment cards. A. True B. False
A. True
The Physical Layer must translate the binary ones and zeros of computer language into the language of the transport medium. A. True B. False
A. True
The function of home-page hijacking is to change a browser's home page to point to the attacker's site. A. True B. False
A. True
The gauss is a measurement of a magnetic field. A. True B. False
A. True
The primary characteristic of a virus is that it replicates and generally involves user action of some type. A. True B. False
A. True
Unlike viruses, worms do not require a host program in order to survive and replicate. A. True B. False
A. True
The ________ is an organization formed in 1994 to develop and publish standards for the World Wide Web. A. World Wide Web Consortium (W3C) B. Internet Architecture Board (IAB) C. Internet Engineering Task Force (IETF) D. International Telecommunication Union (ITU)
A. World Wide Web Consortium (W3C)
A ________ is a type of virus that primarily infects executable programs. A. file infector B. system infector C. data infector D. program infector
A. file infector
A ________ is a virus that attacks and modifies executable programs (like COM, EXE, SYS, and DLL files). A. file infector B. system infector C. data infector D. stealth virus
A. file infector
A _____________ contains rules that define the types of traffic that can come and go through a network. A. firewall B. hub C. switch D. network protocol
A. firewall
Network ________ is gathering information about a network for use in a future attack. A. reconnaissance B. eavesdropping C. denial of service D. surveying
A. reconnaissance
Unexplained increases in bandwidth consumption, high volumes of inbound and outbound e-mail during normal activity periods, a sudden increase in e-mail server storage utilization (this may trigger alarm thresholds set to monitor and manage disk/user partition space), and an unexplained decrease in available disk space are all telltale symptoms of a ________. A. worm B. Trojan C. logic bomb D. DoS
A. worm
Which of the following is the definition of botnet? A. A botnet is a type of virus that primarily infects executable programs. B. A botnet consists of a network of compromised computers that attackers use to launch attacks and spread malware. C. A botnet is a type of virus that includes a separate encryption engine that stores the virus body in encrypted format while duplicating the main body of the virus. D. A botnet is a group of honeypots made to simulate a real live network, but isolated from it.
B. A botnet consists of a network of compromised computers that attackers use to launch attacks and spread malware.
What is the National Institute of Standards and Technology (NIST)? A. An international security standard that documents a comprehensive set of controls that represent information system best practices. B. A federal agency within the U.S. Department of Commerce whose mission is to "promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life." C. A standards organization that develops and promotes Internet standards. D. A U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment.
B. A federal agency within the U.S. Department of Commerce whose mission is to "promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life."
Which of the following is the definition of hub? A. A device that connects two or more networks and selectively interchanges packets of data between them. B. A network device that connects network segments, echoing all received traffic to all other ports. C. A firewall device that examines the state of a connection as well as simple address, port, and protocol rules to determine how to process a packet. D. A suite of protocols designed to connect sites securely using IP networks.
B. A network device that connects network segments, echoing all received traffic to all other ports.
Which of the following is the definition of logic bomb? A. A type of virus that infects other files and spreads in multiple ways. B. A program that executes a malicious function of some kind when it detects certain conditions. C. A type of virus that typically infects a data file and injects malicious macro commands. D. A type of virus that attacks document files containing embedded macro programming capabilities.
B. A program that executes a malicious function of some kind when it detects certain conditions.
The __________ is a national program that empowers and encourages excellence among U.S. organizations, including manufacturers, service organizations, educational institutions, health care providers, and nonprofit organizations. A. Hollings Manufacturing Extension Partnership B. Baldrige National Quality Program C. Technology Innovation Program D. National Institute of Standards and Technology
B. Baldrige National Quality Program
________ allows the computer to get its configuration information from the network instead of the network administrator providing the configuration information to the computer. It provides a computer with an IP address, subnet mask, and other essential communication information, simplifying the network administrator's job. A. Internet Protocol Security (IPSec) B. Dynamic Host Configuration Protocol (DHCP) C. Point-to-Point Tunneling Protocol (PPTP) D. Internet Control Message Protocol (ICMP)
B. Dynamic Host Configuration Protocol (DHCP)
A packet-filtering firewall remembers information about the status of a network communication. A. True B. False
B. False
A smurf attack tricks users into providing logon information on what appears to be a legitimate Web site but is in fact a Web site set up by an attacker to obtain this information. A. True B. False
B. False
A stateful inspection firewall compares received traffic with a set of rules that define which traffic it will permit to pass through the firewall. A. True B. False
B. False
According to its website, the NIST is "the world's largest professional association for the advancement of technology." A. True B. False
B. False
Adware is any unsolicited background process that installs itself on a user's computer and collects information about the user's browsing habits and Web site activities. A. True B. False
B. False
Computer viruses are typically more dangerous than backdoor programs. A. True B. False
B. False
IP addresses are eight-byte addresses that uniquely identify every device on the network. A. True B. False
B. False
One of the OSI Reference Model layers, the Transport Layer, creates, maintains, and disconnects communications that take place between processes over the network. A. True B. False
B. False
One of the OSI Reference Model layers, the Transport Layer, is responsible for maintaining communication sessions between computers. A. True B. False
B. False
Opt-in (subscribe) features in spam messages can represent a new form of reconnaissance attack to acquire legitimate target addresses. A. True B. False
B. False
The ISO was formed in 1918 with the merger of five engineering societies and three government agencies, which merged to form the American Engineering Standards Committee (AESC). A. True B. False
B. False
The International Telecommunication Union (ITU) is the predominant organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes. A. True B. False
B. False
The National Institute of Standards and Technology (NIST) was formed in 1946. It is a nongovernmental international organization whose goal is to develop and publish international standards. A. True B. False
B. False
The hertz is a measure of magnetic flux. A. True B. False
B. False
The worm has to trick users into running it. A. True B. False
B. False
Trojans are self-contained programs designed to propagate from one host machine to another, using the host's own network communications protocols. A. True B. False
B. False
The ________ is the committee of the ITU responsible for ensuring the efficient and effective production of standards covering all fields of telecommunications for all nations. A. Internet Architecture Board (IAB) B. ITU Telecommunication Sector (ITU-T) C. American National Standards Institute (ANSI) D. International Electrotechnical Commission (IEC)
B. ITU Telecommunication Sector (ITU-T)
The _____________ is the preeminent organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes. A. American National Standards Institute B. International Electrotechnical Commission (IEC) C. International Telecommunication Union D. National Institute of Standards and Technology
B. International Electrotechnical Commission (IEC)
Which OSI Reference Model layer creates, maintains, and disconnects communications that take place between processes over the network? A. Presentation Layer B. Session Layer C. Data Link Layer D. Transport Layer
B. Session Layer
Unrecognized new processes running, startup messages indicating that new software has been (or is being) installed (registry updating), unresponsiveness of applications to normal commands, and unusual redirection of normal Web requests to unknown sites are all telltale symptoms of a ________. A. worm B. Trojan C. logic bomb D. DoS
B. Trojan
What term is used to describe the current encryption standard for wireless networks? A. wireless access point (WAP) B. Wi-Fi Protected Access (WPA) C. screened subnet D. Wired Equivalent Privacy (WEP)
B. Wi-Fi Protected Access (WPA)
Another way that malicious code can threaten businesses is by using mass bulk e-mail (spam), spyware, persistence cookies, and the like, consuming computing resources and reducing user productivity. These are known as ________. A. attacks against confidentiality and privacy B. attacks against productivity and performance C. attacks against data integrity D. attacks that damage reputation
B. attacks against productivity and performance
What do the letters of the C-I-A triad stand for? A. confidentiality, information, accessibility B. confidentiality, integrity, availability C. confidentiality, intelligence, availability D. confidentiality, information, accessibility
B. confidentiality, integrity, availability
A ___________ controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network. A. hub B. firewall C. router D. switch
B. firewall
Malicious code attacks all three information security properties. Malware can modify database records either immediately or over a period of time. This property is ________. A. confidentiality B. integrity C. availability D. security
B. integrity
Whether software or hardware based, a ____________ captures keystrokes, or user entries, and then forwards that information to the attacker. A. botnet B. keystroke logger C. file infector D. logic bomb
B. keystroke logger
What term is used to describe a method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address? A. application proxy firewall B. network address translation (NAT) C. Internet Control Message Protocol (ICMP) D. network access control (NAC)
B. network address translation (NAT)
A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator is the definition of ________. A. stateful inspection firewall B. packet-filtering firewall C. application proxy firewall D. Point-to-Point Tunneling Protocol (PPTP)
B. packet-filtering firewall
A ________ enables the virus to take control and execute before the computer can load most protective measures. A. file infector B. system infector C. data infector D. program infector
B. system infector
Which of the following describes the American National Standards Institute (ANSI)? A. A federal agency within the U.S. Department of Commerce whose mission is to "promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life." B. The committee of the ITU responsible for ensuring the efficient and effective production of standards covering all fields of telecommunications for all nations. C. A U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment. D. A subcommittee of the IETF composed of independent researchers and professionals who have a technical interest the overall well-being of the Internet.
C. A U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment.
Which of the following describes the Internet Engineering Task Force (IETF)? A. An international nongovernmental organization with the goal of developing and publishing international standards. B. An international security standard that documents a comprehensive set of controls that represent information systems best practices. C. A standards organization that develops and promotes Internet standards. D. A U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment.
C. A standards organization that develops and promotes Internet standards.
What is meant by multipartite virus? A. A type of virus that typically infects a data file and injects malicious macro commands. B. A type of virus that uses a number of techniques to conceal itself from the user or detection software. C. A type of virus that infects other files and spreads in multiple ways. D. A type of virus that primarily infects executable programs.
C. A type of virus that infects other files and spreads in multiple ways.
The ________ is the main United Nations agency responsible for managing and promoting information and technology issues. A. ITU Telecommunication Sector (ITU-T) B. International Electrotechnical Commission (IEC) C. International Telecommunication Union (ITU) D. Internet Engineering Task Force (IETF)
C. International Telecommunication Union (ITU)
The ________________ is a subcommittee of the IETF that serves as an advisory body to the Internet Society (ISOC). It is composed of independent researchers and professionals who have a technical interest in the well-being of the Internet. A. International Electrotechnical Commission (IEC) B. International Telecommunication Union (ITU) C. Internet Architecture Board (IAB) D. ITU Telecommunication Sector (ITU-T)
C. Internet Architecture Board (IAB)
________ include a separate encryption engine that stores the virus body in encrypted format while duplicating the main body of the virus. A. Retro viruses B. Stealth viruses C. Polymorphic viruses D. Multipartite viruses
C. Polymorphic viruses
The stated purpose of the ___________ is to develop protocols and guidelines that unify the World Wide Web and ensure its long-term growth. A. IETF B. IAB C. W3C D. ANSI
C. W3C
One of the ways that malicious code can threaten businesses is by causing economic damage or loss due to the theft, destruction, or unauthorized manipulation of sensitive data. These are known as ________. A. attacks against confidentiality and privacy B. attacks against productivity and performance C. attacks against data integrity D. attacks that create legal liability
C. attacks against data integrity
Malicious code attacks all three information security properties. Malware can erase or overwrite files or inflict considerable damage to storage media. This property is ________. A. confidentiality B. integrity C. availability D. security
C. availability
What term is used to describe a type of virus that attacks document files containing embedded macro programming capabilities? A. file infector B. multipartite virus C. data infector D. logic bomb
C. data infector
A ___________ is a program that executes a malicious function of some kind when it detects certain conditions. A. worm B. Trojan C. logic bomb D. DoS
C. logic bomb
A method to restrict access to a network based on identity or other rules is the definition of ________. A. screened subnet B. stateful inspection firewall C. network access control (NAC) D. Media Access Control (MAC)
C. network access control (NAC)
A method to restrict access to a network based on identity or other rules is the definition of ________. A. screened subnet B. stateful inspection firewall C. network access control (NAC) D. network address translation (NAT)
C. network access control (NAC)
A ____________ tricks users into providing logon information on what appears to be a legitimate Web site but is in fact a Web site set up by an attacker to obtain this information. A. smurf attack B. DDoS attack C. phishing attack D. Trojan
C. phishing attack
Which of the following is the definition of network address translation (NAT)? A. A management protocol for IP networks. B. A protocol to implement a VPN connection between two computers. C. A method to restrict access to a network based on identity or other rules. D. A method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address.
D. A method of IP address assignment that uses an alternate, public IP address to hide a system's real IP address.
The ________ is a U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment. A. International Electrotechnical Commission (IEC) B. International Organization for Standardization (ISO) C. National Institute of Standards and Technology (NIST) D. American National Standards Institute (ANSI)
D. American National Standards Institute (ANSI)
The ____________ is a network of centers around the United States that offers technical and business assistance to small- and medium-sized manufacturers. A. National Institute of Standards and Technology B. Technology Innovation Program C. Baldrige National Quality Program D. Hollings Manufacturing Extension Partnership
D. Hollings Manufacturing Extension Partnership
Today, _________ standards address a wide variety of topics, including power generation, power transmission and distribution, commercial and consumer electrical appliances, semiconductors, electromagnetics, batteries, solar energy, and telecommunications. The organization was also instrumental in the development of standards for electrical measurements, including the gauss, hertz, and weber. A. ISO B. ITU C. IETF D. IEC
D. IEC
________ is a suite of protocols designed to connect sites securely using IP networks. A. Dynamic Host Configuration Protocol (DHCP) B. Network access control (NAC) C. Point-to-Point Tunneling Protocol (PPTP) D. Internet Protocol Security (IPSec)
D. Internet Protocol Security (IPSec)
Which OSI Reference Model layer must translate the binary ones and zeros of computer language into the language of the transport medium? A. Data Link Layer B. Transport Layer C. Session Layer D. Physical Layer
D. Physical Layer
What name is given to a protocol to implement a VPN connection between two computers? A. Dynamic Host Configuration Protocol (DHCP) B. Internet Control Message Protocol (ICMP) C. screened subnet D. Point-to-Point Tunneling Protocol (PPTP)
D. Point-to-Point Tunneling Protocol (PPTP)
In a __________, the attacker uses IP spoofing to send a large number of packets requesting connections to the victim computer. These appear to be legitimate but in fact reference a client system that is unable to respond. A. smurf attack B. phishing attack C. DoS attack D. SYN flood attack
D. SYN flood attack
________ counter the ability of antivirus programs to detect changes in infected files. A. Retro viruses B. Stealth viruses C. Polymorphic viruses D. Slow viruses
D. Slow viruses
Cascading Style Sheets (CSS), Common Gateway Interface (CGI), and Hypertext Markup Language (HTML) are standards developed or endorsed by the ____________. A. IETF B. IAB C. ANSI D. W3C
D. W3C
Malware developers often use _____________ to write boot record infectors. A. C programming language B. C++ programming language C. Java D. assembly language
D. assembly language
In a _________, attackers direct forged Internet Control Message Protocol (ICMP) echo-request packets to IP broadcast addresses from remote locations to generate denial of service attacks. A. phishing attack B. SYN flood attack C. polymorphic virus D. smurf attack
D. smurf attack
________ is a document produced by the IETF that contains standards as well as other specifications or descriptive contents. A. A Request for Comments (RFC) B. ISO 17799 C. ISO/IEC 27002 D. The Special Publications 800 series
A. A Request for Comments (RFC)
Unlike other organizations that specifically focus on engineering or technical aspects of computing and communication, the __________ primarily addresses standards that support software development and computer system operation. A. ANSI B. NIST C. ISO D. IETF
A. ANSI
Which OSI Reference Model layer uses Media Access Control (MAC) addresses? Device manufacturers assign each hardware device a unique MAC address. A. Data Link Layer B. Presentation Layer C. Transport Layer D. Session Layer
A. Data Link Layer
The ________ provides oversight for architecture for Internet protocols and procedures, processes used to create standards, editorial and publication procedures for RFCs, and confirmation of IETF chair and technical area directors. It also provides much of the high-level management and validation of the processes of conducting IETF business. A. IAB B. IETF C. ITU D. W3C
A. IAB
________ is an international security standard that documents a comprehensive set of controls that represent information systems best practices. A. ISO 27000 B. The International Electrotechnical Commission (IEC) C. ISO/IEC 27002 D. The Internet Engineering Task Force (IETF)
A. ISO 27000
Which OSI Reference Model layer is responsible for the coding of data? A. Presentation Layer B. Session Layer C. Data Link Layer D. Transport Layer
A. Presentation Layer
________ attack countermeasures such as antivirus signature files or integrity databases. A. Retro viruses B. Stealth viruses C. Polymorphic viruses D. Slow viruses
A. Retro viruses
A computer virus is an executable program that attaches to, or infects, other executable programs. A. True B. False
A. True
A network protocol governs how networking equipment interacts to deliver data across the network. A. True B. False
A. True
A successful DoS attack crashes a server or network device or creates so much network congestion that authorized users cannot access network resources. A. True B. False
A. True
Border firewalls simply separate the protected network from the Internet. A. True B. False
A. True
ISO 17799 is an international security standard. A. True B. False
A. True
_____________ are the main source of distributed denial of service (DDoS) attacks and spam. A. Logic bombs B. Botnets C. Stealth viruses D. Trojans
B. Botnets
The purpose of the ________ is to "make the Internet work better." It focuses on the engineering aspects of Internet communication and attempts to avoid policy and business questions. It is an open organization, and it has no membership requirements. A. IAB B. IETF C. ITU D. W3C
B. IETF
________ are viruses that target computer hardware and software startup functions. A. File infectors B. System infectors C. Data infectors D. Stealth virus
B. System infectors
Which of the following is the definition of packet-filtering firewall? A. An advanced firewall that processes all traffic between two systems. Instead of allowing a direct connection between two systems, it connects to each system separately and passes filtered traffic to the destination based on filtering rules. B. A firewall device that has three NICs. One NIC connects to the Internet, the second connects to the internal network, and the third connects to a DMZ. C. A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator. D. A protocol used on IP networks to provide configuration details automatically to client computers.
C. A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator.
Which OSI Reference Model layer is responsible for transmitting information on computers connected to the same local area network (LAN)? A. Presentation Layer B. Session Layer C. Data Link Layer D. Transport Layer
C. Data Link Layer
As of 2013, Cisco estimated that there were more than ________ devices connected to the Internet. A. 700 million B. 1.7 billion C. 3.5 billion D. 7 billion
D. 7 billion
Which OSI Reference Model layer includes all programs on a computer that interact with the network? A. Presentation Layer B. Session Layer C. Network Layer D. Application Layer
D. Application Layer