SRA111 PreQuiz2

Card Set Information

Author:
guntoro
ID:
251822
Filename:
SRA111 PreQuiz2
Updated:
2013-12-08 21:07:13
Tags:
SRA111 PreQuiz2
Folders:

Description:
SRA111 PreQuiz2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user guntoro on FreezingBlue Flashcards. What would you like to do?


  1. 1.The ____ data file contains the hashed representation of the user’s password.
    A) SNMP
    B) FBI
    C) SAM (Security Account Manager)
    D) SLA
    C) SAM
    (this multiple choice question has been scrambled)
  2. 2.A firewall is a mechanism that keeps certain kinds of network traffic out of a private network. (T/F)
    True
  3. 3.An act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “forces of nature.” (T/F)
    False - Deliberate acts of sabotage or vandalism
  4. 4.A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms. (T/F)
    True
  5. 5.Once a(n)________________ has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system.
    Virus
  6. 6.____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
    A) Helpers
    B) Zombies
    C) Servants
    D) Drones
    B) Zombies
    (this multiple choice question has been scrambled)
  7. 7.Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.
    A) MIN
    B) MSL
    C) SLA (Software License Agreement)
    D) SSL
    C) SLA
    (this multiple choice question has been scrambled)
  8. 8.One form of e-mail attack that is also a DoS is called a mail _________ , in which an attacker routes large quantities of e-mail to the target.
    bomb
  9. 9.The shoulder _________________ technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance.
    surfing
  10. 10.A sniffer program shows all the data going by on a network segment including passwords, the data inside files—such as word-processing documents—and screens full of sensitive data from applications. (T/F)
    True
  11. 11.The application of computing and network resources to try every possible combination of options of a password is called a brute ______________ attack.
    force
  12. 12.Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs. (T/F)
    False
  13. 13.ESD means electrostatic ____________________.
    discharge
  14. 14.A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset.
    threat
  15. 15.____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
    Spoofing
  16. 16.The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
    A) WWW
    B) FTP
    C) HTTP
    D) TCP
    D) TCP
    (this multiple choice question has been scrambled)
  17. 17.A(n) ____________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.
    vulnerability
  18. 18.One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
    A) cyberhack
    B) hackcyber
    C) phvist
    D) hactivist
    D) hactivist
    (this multiple choice question has been scrambled)
  19. 19.A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. (T/F)
    True
  20. 20.A momentary low voltage is called a(n) ____________________.
    sag
  21. 21.In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
    A) sniff-in-the-middle
    B) server-in-the-middle
    C) man-in-the-middle
    D) zombie-in-the-middle
    C) man-in-the-middle
    (this multiple choice question has been scrambled)
  22. 22.A(n) ____________________ is an act that takes advantage of a vulnerability to compromise a controlled system.
    attack
  23. 23.A worm requires that another program is running before it can begin functioning. (T/F)
    False - worm don't need other program
  24. 24.A ____ is an attack in which a coordinat
    A) spam
    B) virus
    C) distributed denial-of-service
    D) denial-of-service
    C) distributed denial-of-service
    (this multiple choice question has been scrambled)
  25. 25.A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
    back
  26. 26.____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.
    A) SSL
    B) SIS
    C) PKI (Public Key Infrastructure)
    D) PKC
    C) PKI
    (this multiple choice question has been scrambled)
  27. 27.A __________________ threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.
    polymorphic
  28. 28.The ___________ virus infects the key operating system files located in a computer’s boot sector.
    boot
  29. 29.DoS attacks cannot be launched against routers. (T/F)
    False
  30. 30.Packet _____________ use automated exploits to engage in distributed denial-of-service attacks.
    monkeys
  31. 31.A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws. (T/F)
    True
  32. 32.Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
    A) trespass
    B) nature
    C) security
    D) bypass
    A) trespass
    (this multiple choice question has been scrambled)
  33. 33.Complete loss of power for a moment is known as a ____.
    A) brownout
    B) fault
    C) sag
    D) blackout
    B) fault
    (this multiple choice question has been scrambled)
  34. 34.Attacks conducted by scripts are usually unpredictable. (T/F)
    False
  35. 35.The timing attack explores the contents of a Web browser’s ____________________.
    cache
  36. 36.The term _______________ is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
    cracker
  37. 37.Script ____________________ are hackers of limited skill who use expertly written software to attack a system.
    kiddies
  38. 38.A(n) ____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle.
    buffer overflow
  39. 39.A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
    phreaker
  40. 40.Which of the following functions does information security perform for an organization?
    A) Enabling the safe operation of applications implemented on the organization's IT systems.
    B) Protecting the data the organization collects and uses.
    C) All of the above.
    D) Protecting the organization's ability to function.
    C) All of the above.
    (this multiple choice question has been scrambled)
  41. 41.Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people. (T/F)
    True
  42. 42.Sniffers often work on TCP/IP networks, where they’re sometimes called __________________ sniffers.
    packet
  43. 43.____ is any technology that aids in gathering information about a person or organization without their knowledge.
    A) Worm
    B) A bot
    C) Spyware
    D) Trojan
    C) Spyware
    (this multiple choice question has been scrambled)
  44. 44.A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment.
    worm
  45. 45.When voltage levels ____________ (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
    spike
  46. 46.____ are software programs that hide their true nature, and reveal their designed behavior only when activated.
    A) Worms
    B) Trojan Horses
    C) Spam
    D) Viruses
    B) Trojan Horses
    (this multiple choice question has been scrambled)
  47. 47.“4-1-9” fraud is an example of a ____ attack.
    A) worm
    B) spam
    C) social engineering
    D) virus
    C) social engineering
    (this multiple choice question has been scrambled)
  48. 48.With the removal of copyright protection, software can be easily distributed and installed. (T/F)
    True

What would you like to do?

Home > Flashcards > Print Preview