Quiz 1 Flashcards
Question 1 options:
industrial espionage
financial gain
all of the above
revenge
all of the above
In an IDPS, specific indications of a possible attack are called
Question 2 options:
signatures
true positives
signals
alerts
signatures
Which of the following malware is designed to replicate itself?
Question 3 options:
A) virus
B) SYN flood
C) Trojan horse
D) worm
A) virus
D) worm
An uninterruptible power supply is a component of what type of security?
Question 4 options:
virtual
physical
password
auditing
physical
Most network threats originate from which of the following?
Question 5 options:
inside the company
industrial spies
script kiddies
back doors
inside the company
The Stuxnet worm was designed to
Question 6 options:
be used by script kiddies
shut down Internet DNS servers
disrupt computer-controlled industrial operations
steal financial information
disrupt computer-controlled industrial operations
The capability to prevent one participant in an electronic transaction from denying that
it performed an action is called
Question 7 options:
integrity
nonrepudiation
undeniability
plausible deniability
nonrepudiation
Servers with outside access to the public should be located on
Question 8 options:
A) an internal LAN
B) a DMZ
C) their own subnet
D)a network perimeter
B) a DMZ
C) their own subnet
D)a network perimeter
A packet-filtering device evaluates data in the payload and compares it with a predefined
set of rules.
Question 9 options:
True
False
False
An IP address combined with a TCP/IP port number is called which of the following?
Question 10 options:
socket
script
port ID
network address
socket
Name four goals of network security.
nonrepudiation,
Confidentiality,
Integrity,
Availability
Packet filters can block or allow transmission of packets based on which of the following
criteria?
Question 12 options:
A) time of access attempts
B) open ports
C) port number
D) IP address
A) time of access attempts
D) IP address
In a restrictive firewall policy, what is the starting point for developing a rule base?
Question 13 options:
allow all traffic except specified types
block all traffic
block all traffic except specified types
allow all traffic
block all traffic
Firewall enforcement of policies is handled primarily through setting up packet-filtering
rules, a set of which is contained in the
Question 14 options:
access control list
packet filter
rule base
routing table
rule base
An attacker who causes harm to systems in support of some principle is categorized
as which of the following?
Question 15 options:
cracker
cyberterrorist
industrial spy
hacker
cyberterrorist