EXAM Flashcards
T or F. The potential for a hacker to compromise the system is called an attack.
F. The potential for a hacker to compromise the system is called an attack.
It’s a threat
T or F. A virus deletes all of the content of your hard drive at home. This was the virus’ transport mechanism.
F. A virus deletes all of the content of your hard drive at home. This was the virus’ transport mechanism.
It’s the payload – or what the virus does when it executes.
T or F. A particular type of malware looks for an Administrator’s name on the payroll. If its not found, it starts to delete files. This is known as a backdoor.
F. A particular type of malware looks for an Administrator’s name on the payroll. If its not found, it starts to delete files. This is known as a backdoor.
This describes a logic bomb
T or F. A virus is a fragment of code that requires user action to deliver its payload.
T. A virus is a fragment of code that requires user action to deliver its payload.
Worms are standalone code that automatically replicates across the network.
Sarbanes-Oxley applies to which industry?
- Publicly traded companies
- Healthcare
- Financial
- Retail
Sarbanes-Oxley applies to which industry?
-Publicly traded companies
GLBA applies to which industry?
- Publicly traded companies
- Healthcare
- Financial
- Retail
GLBA applies to which industry?
-Financial
PCI-DSS applies to which industry?
- Publicly traded companies
- Healthcare
- Financial
- Retail
PCI-DSS applies to which industry?
-Retail
Information about yourself, such as your SSN, is called _____ ________ ______.
Personally Identifiable Information.
True or False. FISMA only applies to federal agencies.
True
Which of the following is the estimated asset value loss for the year? (ALE, ARO, AV)
ALE
Risk acceptance means what, and would be used when?
Do nothing to mitigate (reduce) the risk. It would be used when the cost of the risk is less than the cost of the control.
T or F. Your boss asks you to do a port scan of a competitor’s website. This is OK as long as you document that the boss asked you to do this.
& What is the law you just broke if you did hack the competitor?
F
18 U.S.C. 1030
What section in the act governs unauthorized eavesdropping on transmitted communications?
Section 2511
Breaking a cipher by trying to use every possible key combination is a __________ attack.
Brute Force attack
The process of defeating cryptographic systems is known as ___________________.
- Cryptography
- Cryptanalysis
- Cryptology
- Decryption
Cryptanalysis
SNMP is a protocol that traps network messages into a MIB that can be logged into to access the data.
What version of SNMP should you be using and why?
3.0 or higher as it encrypts network traffic and the “community string” which is the SNMP password at the devices.
A wireless encryption protocol that has a weakness with its initialization vector
- WEP
- WPA
- DES
- WPA2 Enterprise
WEP – WPA2 is the one that you should be using (802.11i)
_______ is the protocol that resolves IP addresses to MAC addresses
ARP
T or F. Changing your IP Address to masquerade as someone else is called IP Poisoning.
F.
It’s called IP Spoofing
An _______________ ______________ is an attack on a wireless network in which an Access Point is configured exactly like an authorized AP.
Evil Twin
An address associated with an application running on the system is known as a (MAC address, IP address, port number). Pick one.
port number
This is an attack on a network layer protocol that resolves application layer addresses to network layer addresses. It can be used to redirect the user to a malicious Web site where authentication credentials can be obtained.
- DNS Poisoning
- ARP Poisoning
- IP Spoofing
- Smurf Attack
DNS Poisoning
Which of the following is not a range used by NAT for private IP Addresses.
a. 10.0. 0.0 – 10.255. 255.255.
b. 172.16. 0.0 – 172.31. 255.255.
c. 192.168. 0.0 – 192.168. 255.255.
172.16. 0.0 – 172.31. 255.255.
An attack in which the system is flooded with packets to make it unavailable to others is a _____________.
DoS or DDoS