Chapter 3 Assessment Flashcards

1
Q

The main goal of a hacker is to steal or compro

mise IT assets and potentially steal data

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes intellectual

property?

A
All of the above --
A. The items a business has copyrighted
B. All patents owned by a business
C. The unique knowledge a business possesses
D. Customer lists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following terms best describes a

person with very little hacking skills?

A

Script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A(n) _____ is a software tool that is used to capture

packets from a network.

A

packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of attacks result in legitimate users

not having access to a system resource?

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A SYN flood attack floods a target with invalid or

half-open TCP connection requests.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following is an example of social
engineering. A. SQL injection
B. XML injection
C. Security design
D. Impersonation
E. All of the above
A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following security countermeasures

is best for end-point protection against malware?

A
All of the above--
A. Antivirus/anti-malware protection
B. Data leakage prevention
C. Standardized workstation and laptop images
D. Security awareness training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wardriving involves looking for open or public

wireless networks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following impacts availability?

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of attack involves capturing data
packets from a network and transmitting them
later to produce an unauthorized effect?

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n) _____ is any action that could damage an

asset.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) _____ is any weakness that makes it possible for a threat to cause harm to a computer or
network.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

vulnerability

Which type of malware is a self-contained pro
gram that replicates and sends copies of itself to
other computers, generally across a network?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of malware involves extorting the
user or organization into paying money to release
a decryption key?

A

Cryptolocker malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly