Chapter 9 Flashcards
Different types of organizations have similar levels of network security risks.
False
The term malware is derived from a combination of the words malicious and software.
True
A hacker, in the original sense of the word, is someone with technical skills and malicious intent.
False
The day after Patch Tuesday is informally Exploit Wednesday.
True
A drop ceiling could be used by an intruder to gain access to a secured room.
True
Over a long distance connection, using SSH keys is more secure than using passwords.
True
The original version of the Secure Hash Algorithm was developed by MIT.
False
Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.
True
Current research indicates that a long, random string of words, such as correct horse battery staple is much more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.
True
It is ideal to use the same password for multiple different applications, provided the password is complex enough.
False
Which penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?
metasploit
Which of the following statements correctly describes the malware characteristic of polymorphism?
Polymorphic malware can change its characteristics every time its transferred to a new system
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what kind of malware?
Logic bomb
Which of the following statements describes a worm?
A program that runs independently of other software and travels between computers a across networks
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
Honeynet
An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?
Man-in-the-Middle attack