cyber security 2016 SLC Flashcards
What type of convert attack uses devices or computer programs that captures anything the user types or anything the user clicks with a mouse?
A . Keylogger
Spoofing is the act of falsely identifying a packet’s IP address, MAC address, etWhich of the below are three types of Spoofing?
A) ARP Poisoning, Web Spoofing, and DNS Spoofing
B) Web Spoofing, DNS Spoofing, and Relay Spoofing
C) Web Spoofing, ARP Poisoning, and Relay Spoofing
D) DNS Spoofing, Relay Spoofing, and ARP Poisoning
A) ARP Poisoning, Web Spoofing, and DNS Spoofing
This refers to applications or files that are not classified as viruses or Trojan Horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization. This is done by performing a variety of undesired actions such as irritating users with pop-up windows, tracking user habits, and unnecessarily exposing computer vulnerabilities to attack.
C) Grayware
Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. What are three methods antivirus software use to identify malware?
D) Signature-Based Detection, Heuristic-Based Detection, File Emulation
Cloud-computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. What is the primary function of cloud antivirus technology?
C) A technology that uses lightweight agent software on the protected computer, while offloading the majority of data analysis to the provider’s infrastructure.
Your regular bills and account statements do not arrive on time, you never receive bills or collection notices for products or services, or you receive calls from debt collectors about debts that do not belong to you are examples of:
C) Red Flags of Identity Theft
What type of Trojan Horses send a copy of itself to all recipients in a user’s address book, which causes an outbreak by passing throughout a network?
D) Droppers
What is considered the first piece of malicious software to have caused significant damage on the Internet?
B) Morris worm
A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware that gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload. What do Trojans install that create a hidden opening allowing access to a system?
A) Backdoor
A computer virus is a type of malware that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector. When this replication succeeds, the affected areas are then said to be infected. This type of virus spreads by infecting USB disks or hard drive disks. The virus is loaded into memory and attempts to infect any and all disks inserted into the computer.
C) Boot Sector
Which one of the following is a network attack where the attacker creates an ICMP packet that’s larger than the maximum allowed size of 65,535 bytes?
C) Ping of Death
12) Which one of the following is a form of social engineering where an unauthorized person follows closely behind an authorized person into a restricted area?
A) piggybacking
13) Computer software, or just software, is any set of machine-readable instructions that directs a computer’s processor to perform specific operations. Changes and improvements to software happen. What is a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable bundle because installing is easier and less error-prone?
A) Service Pack
14) This must be regularly updated by a computer’s anti-virus program and is used to identify potential malicious software?
C) signature file
Which class of brute-force mathematical attack exploits mathematical weaknesses of hash algorithms and one-way hash functions?
C) Birthday Attack
Many legislative Acts affect computer security. Which Act changed computer crime damage assessments, increasing the number of crimes violating federal law?
C) The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (Patriot Act)
TCP/IP provides end-to-end connectivity, specifying how data should be formatted, addressed, transmitted, routed, and received at the destination. The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model groups similar communication functions into one of seven logical layers. Which four of the seven layers does TCP/IP operate?
C) Application, Transport, Network, Data Link
18) Which is a set of protocols developed to support the secure exchange of packets and is required in IPv6?
D) IPsec
19) How do organizations classify information such as client lists, product designs, and organizational strategies?
B) sensitive
20) Risk is comprised of what two components?
C) Vulnerability and Threat
21) A security database that contains entries for users and their access rights for files and folders is known as?
B) an access control list (ACL)
22) The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model groups similar communication functions into one of seven logical layers. This hardware device operates at the data link layer of the OSI model and can limit hostile sniffing on a LAN (Local Area Network)?
A) Ethernet Switch
23) The purpose of classification is to protect information from being used to damage or endanger national security, research and development, or proprietary information. How do organizations classify information such as client lists, product designs, and organizational strategies?
A) sensitive
24) What can an intruder place between two endpoints to capture an entire session?
B) sniffers
25) Internet browsers use this to store pages and other multimedia content, such as video and audio files, from websites visited by the user. This allows such websites to load more quickly the next time they are visited.
D) temporary Internet file
D) temporary Internet file
26) File Transfer Protocol (FTP) uses a client-server architecture and uses separate control and data connections between the client and the server. What do system administrators do to secure a FTP server so only authorized users can access the server?
A) Disable Anonymous Authentication
a
27) Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) Snort’s open source network-based intrusion detection system has the ability to perform real-time traffic analysis and packet logging on IP networks. Snort performs protocol analysis, content searching, and content matching. What is the correct Snort Rule syntex to log TCP traffic from any port going to ports less than or equal to 4000 on the 192.168.1.0 network?
A) log tcp any any -> 192.168.1.0/24 :4000
a
28) At what stage of the security system development life cycle do organization’s purchase or build security solution?
A) Implementation Phase
a
29) Some virtual networks may not use encryption to protect the data contents. What process do users initiate when carrying a payload over an incompatible delivery-network, or providing a secure path through an untrusted network?
D) Tunneling
d
30) When collecting digital evidence from a crime scene, often the best strategy for dealing with a computer that is powered on is to:
C) unplug it
c
31) This is a non-malicious, yet false message spread by users forwarding to a large number of recipients.
C) e-mail hoax
c
32) What is the unique number assigned to a message by the e-mail server?
D) message ID
d
33) A cyber attack is a type of offensive maneuver employed by both individuals and whole organizations that target computer information systems, infrastructures, computer networks, and/ or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system. What is a Distributed Denial of Service Attack?
C) An attack in which multitudes of compromised systems attack a single target and the flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.
34) This protocol is used to encrypt and digitally sign email messages using the X.509 format for certificates.
D) S/MIME
d
35) Why is instant messaging dangerous for file transfers?
A) It bypasses server-based malware protection.
a
36) What is the difference between SMTP and POP3?
.
B) The SMTP server listens on port 25, while POP3 listens on port 110.
b
37) Simple Mail Transfer Protocol (SMTP) is an Internet standard for email transmission across Internet Protocol (IP) networks. Your SMTP server is the source of excessive spam emails. What is the most likely cause?
C) The anonymous relays are not disabled
c
38) What is the act of making an e-mail message look like it came from someone else or a different location?
D) spoofing
d
39) Attackers have learned to capitalize and take advantage of the human factor in trust relationships. What type of attack uses chat, social media, and email to exploit trust relationships?
C) Online attack
c
40) What is the purpose of the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003?
B) Allow email marketers to send unsolicited commercial e-mail as long as it adheres to 3 basic types of compliance: unsubscribe, content, and sending behavior compliance
b