SRA111 PreQuiz2

Card Set Information

SRA111 PreQuiz2
2013-12-08 21:07:13
SRA111 PreQuiz2

SRA111 PreQuiz2
Show Answers:

  1. 1.The ____ data file contains the hashed representation of the user’s password.
    A) SNMP
    B) FBI
    C) SAM (Security Account Manager)
    D) SLA
    C) SAM
    (this multiple choice question has been scrambled)
  2. 2.A firewall is a mechanism that keeps certain kinds of network traffic out of a private network. (T/F)
  3. 3.An act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “forces of nature.” (T/F)
    False - Deliberate acts of sabotage or vandalism
  4. 4.A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms. (T/F)
  5. 5.Once a(n)________________ has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system.
  6. 6.____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
    A) Helpers
    B) Zombies
    C) Servants
    D) Drones
    B) Zombies
    (this multiple choice question has been scrambled)
  7. 7.Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.
    A) MIN
    B) MSL
    C) SLA (Software License Agreement)
    D) SSL
    C) SLA
    (this multiple choice question has been scrambled)
  8. 8.One form of e-mail attack that is also a DoS is called a mail _________ , in which an attacker routes large quantities of e-mail to the target.
  9. 9.The shoulder _________________ technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance.
  10. 10.A sniffer program shows all the data going by on a network segment including passwords, the data inside files—such as word-processing documents—and screens full of sensitive data from applications. (T/F)
  11. 11.The application of computing and network resources to try every possible combination of options of a password is called a brute ______________ attack.
  12. 12.Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs. (T/F)
  13. 13.ESD means electrostatic ____________________.
  14. 14.A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset.
  15. 15.____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
  16. 16.The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
    A) WWW
    B) FTP
    C) HTTP
    D) TCP
    D) TCP
    (this multiple choice question has been scrambled)
  17. 17.A(n) ____________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.
  18. 18.One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
    A) cyberhack
    B) hackcyber
    C) phvist
    D) hactivist
    D) hactivist
    (this multiple choice question has been scrambled)
  19. 19.A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. (T/F)
  20. 20.A momentary low voltage is called a(n) ____________________.
  21. 21.In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
    A) sniff-in-the-middle
    B) server-in-the-middle
    C) man-in-the-middle
    D) zombie-in-the-middle
    C) man-in-the-middle
    (this multiple choice question has been scrambled)
  22. 22.A(n) ____________________ is an act that takes advantage of a vulnerability to compromise a controlled system.
  23. 23.A worm requires that another program is running before it can begin functioning. (T/F)
    False - worm don't need other program
  24. 24.A ____ is an attack in which a coordinat
    A) spam
    B) virus
    C) distributed denial-of-service
    D) denial-of-service
    C) distributed denial-of-service
    (this multiple choice question has been scrambled)
  25. 25.A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
  26. 26.____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.
    A) SSL
    B) SIS
    C) PKI (Public Key Infrastructure)
    D) PKC
    C) PKI
    (this multiple choice question has been scrambled)
  27. 27.A __________________ threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.
  28. 28.The ___________ virus infects the key operating system files located in a computer’s boot sector.
  29. 29.DoS attacks cannot be launched against routers. (T/F)
  30. 30.Packet _____________ use automated exploits to engage in distributed denial-of-service attacks.
  31. 31.A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws. (T/F)
  32. 32.Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
    A) trespass
    B) nature
    C) security
    D) bypass
    A) trespass
    (this multiple choice question has been scrambled)
  33. 33.Complete loss of power for a moment is known as a ____.
    A) brownout
    B) fault
    C) sag
    D) blackout
    B) fault
    (this multiple choice question has been scrambled)
  34. 34.Attacks conducted by scripts are usually unpredictable. (T/F)
  35. 35.The timing attack explores the contents of a Web browser’s ____________________.
  36. 36.The term _______________ is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
  37. 37.Script ____________________ are hackers of limited skill who use expertly written software to attack a system.
  38. 38.A(n) ____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle.
    buffer overflow
  39. 39.A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
  40. 40.Which of the following functions does information security perform for an organization?
    A) Enabling the safe operation of applications implemented on the organization's IT systems.
    B) Protecting the data the organization collects and uses.
    C) All of the above.
    D) Protecting the organization's ability to function.
    C) All of the above.
    (this multiple choice question has been scrambled)
  41. 41.Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people. (T/F)
  42. 42.Sniffers often work on TCP/IP networks, where they’re sometimes called __________________ sniffers.
  43. 43.____ is any technology that aids in gathering information about a person or organization without their knowledge.
    A) Worm
    B) A bot
    C) Spyware
    D) Trojan
    C) Spyware
    (this multiple choice question has been scrambled)
  44. 44.A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment.
  45. 45.When voltage levels ____________ (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
  46. 46.____ are software programs that hide their true nature, and reveal their designed behavior only when activated.
    A) Worms
    B) Trojan Horses
    C) Spam
    D) Viruses
    B) Trojan Horses
    (this multiple choice question has been scrambled)
  47. 47.“4-1-9” fraud is an example of a ____ attack.
    A) worm
    B) spam
    C) social engineering
    D) virus
    C) social engineering
    (this multiple choice question has been scrambled)
  48. 48.With the removal of copyright protection, software can be easily distributed and installed. (T/F)