network defense ch 1
A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses. True or False
False
A worm creates files that copy themselves repeatedly and consume disk space. True or False
True
Physical security protects a system from theft, fire, or environmental disaster. True or False
True
With discretionary access control, network users can share information with other users, making it more risky than MAC. True or False
True
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following? a. botnet b. Trojan c. logic bomb d. packet monkey
botnet
A hactivist can best be described as which of the following? a. an unskilled programmer that spreads malicious scripts, b. consider themselves seekers of knowledge, c. use DoS attacks on Web sites with which they disagree, d. deface Web sites by leaving messages for their friends to read
c. use DoS attacks on Web sites with which they disagree
What is a program that appears to do something useful but is actually malware? a. virus b. logic bomb c. Trojan d. back door
Trojan
Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred. True or False
False
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus? a. worm b. macro c. back door d. Trojan
macro