Chapter 3 Assessment Flashcards
The main goal of a hacker is to steal or compro
mise IT assets and potentially steal data
True
Which of the following best describes intellectual
property?
All of the above -- A. The items a business has copyrighted B. All patents owned by a business C. The unique knowledge a business possesses D. Customer lists
Which of the following terms best describes a
person with very little hacking skills?
Script kiddie
A(n) _____ is a software tool that is used to capture
packets from a network.
packet sniffer
Which type of attacks result in legitimate users
not having access to a system resource?
DDoS
A SYN flood attack floods a target with invalid or
half-open TCP connection requests.
True
Which of the following is an example of social engineering. A. SQL injection B. XML injection C. Security design D. Impersonation E. All of the above
Impersonation
Which of the following security countermeasures
is best for end-point protection against malware?
All of the above-- A. Antivirus/anti-malware protection B. Data leakage prevention C. Standardized workstation and laptop images D. Security awareness training
Wardriving involves looking for open or public
wireless networks
True
Which of the following impacts availability?
DDoS
Which type of attack involves capturing data
packets from a network and transmitting them
later to produce an unauthorized effect?
Replay
A(n) _____ is any action that could damage an
asset.
Threat
A(n) _____ is any weakness that makes it possible for a threat to cause harm to a computer or
network.
vulnerability
vulnerability
Which type of malware is a self-contained pro
gram that replicates and sends copies of itself to
other computers, generally across a network?
Worm
Which type of malware involves extorting the
user or organization into paying money to release
a decryption key?
Cryptolocker malware