IS3110 CHAP 15 Flashcards

1
Q

A Web site used to hide a user’s activity on the Internet. The user visits the ___ site and then requests pages from other sites. The ___ retrieves the Web pages and serves them as if they are served from the ___ site.

A

Anonymizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A formal process created by the organization to respond to computer incidents. It includes a definition of a computer incident.

A

CIRT plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is any activity that threatens the security of the computer systems. It affects the organization’s security. It may result in loss of confidentiality, integrity, or availability.

A

computer incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A group of people who will respond to incidents. This group can be a formal team designated in advance. It can also be an informal group created after an incident occurs.

A

Computer incident response team (CIRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A result of peer-to-peer (P2P) programs. P2P programs are commonly used to download pirated music, movies, and applications. Users are often unaware that the P2P programs also share data on their systems. ___ occurs when data on a user’s system is shared without the user’s knowing it.

A

Data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that includes viruses, worms, Trojan horses, or any other type of malicious software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A(n) ___ is a violation of a security policy or security practice.
A

Computer incident or computer security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. All events on a system or network are considered computer security incidents.
    TRUE OR FALSE
A

FALSE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. An administrator has discovered that a Web server is responding very slowly. Investigation show that the processor, memory, and network resources are being consumed by outside attackers. This is a ___ attack.
A

Denial of service (DoS) or distributed DoS (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A user has installed P2P software on a system. The organization’s policy specifically states this is unauthorized. An administrator discovered the software on the user’s system. Is this a computer security incident? If so, what type?
  2. This is not a computer security incident
  3. This is a form of inappropriate usage
  4. This is a form of unauthorized access
  5. This is a form of malware
A

This is a form of inappropriate usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Some malware can execute on a user’s system after the user accesses a Web site. The malware executes
    from within the Web browser. What type of malware is
    this?
  2. Virus
  3. Worm
  4. Trojan horse
  5. Mobile code
A

Mobile code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A malicious virus is replicating and causing damage to computer. How do security professionals refer to the virus?
  2. In the open
  3. In the containment field
  4. In the jungle
  5. In the wild
A

In the wild

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is the greatest risk to an organization when peer to peer software is installed on a user’s system?
  2. Loss of copyrights
  3. Piracy of the organization’s copyrighted material
  4. Data leakage
  5. DoS attacks
A

Data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Only police or other law enforcement personnel are allowed to do computer forensic investigations.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A log has shown that a user has copied proprietary data to his computer. The organization wants to take legal action against the user. You are tasked with seizing the computer as evidence.
  2. Chain of command
  3. Forensic chain
  4. Permission from the user
  5. Chain of custody
  6. All the above
A

Chain of command
Forensic chain
Permission from the user
Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Many steps are taken before, during, and after an incident. Of the following choices, what accurately identifies the incident response life cycle?
  2. Preparation, deletion and analysis, eradication and recovery, and post-incident recover
  3. Detection and analysis, containment, backup and eradication, and post-incident recovery
  4. Preparation, detection and analysis, containment, eradication and recovery, and post-incident recovery
  5. Preparation, detection, deletion and analysis, containment and recovery, and post-incident recovery
A

Preparation, detection and analysis, containment, eradication and recovery, and post-incident recovery

17
Q
  1. In general, it is acceptable for members of a CIRT to take actions to attack attackers. This is one of the normal responsibilities of a CIRT.
    TRUE OR FALSE
A

FALSE

18
Q
  1. After an incident has been verified, you need to ensure that it doesn’t spread to other systems. What is this called?
  2. Spread avoidance
  3. Containment
  4. Incident response
  5. Impact and priority calculation
A

Containment

19
Q
  1. Which of the following may be included in a CIRT plan?
  2. Policies
  3. Definitions of incidents
  4. CIRT member responsibilities
  5. Incident handling procedures
  6. All the above
  7. 3 and 4 only
A

CIRT member responsibilities

Incident handling procedures

20
Q
  1. Attackers attempt a DoS attack on servers in your organization. The CIRT respond and mitigates the attack. What should be the last step that the CIRT will complete in response to this incident?
  2. Attack the attacker
  3. Contain the threat
  4. Document the incident
  5. Report the incident
A

Document the incident

21
Q
  1. Several types of malicious code exist. Malware that appears to be one thing but is actually something else is ___.
A

A Trojan Horse