Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITN266 Midterm

QuestionAnswer
Most traditional external attackers were heavily motivated by ________. the thrill of breaking in
In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. extortion
A botmaster can remotely ________. Both fix a bug in the bots and update bots with new functionality
________ consists of activities that violate a company's IT use policies or ethics policies. Abuse
A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets. DoS
Sophisticated attacks often are difficult to identify amid the "noise" of many ________ attacks. script kiddie
Countries would engage in cyberwar ________. Both before a physical attack and after a physical attack
Which hacker group was likely involved in the Sony data breaches? LulzSec
Watching someone type their password in order to learn the password is called ________. shoulder surfing
Which of the following can be a type of spyware? Both A cookie and A keystroke logger
One of the two characterizations of expert hackers is ________. dogged persistence
Which type of program can hide itself from normal inspection and detection? Rootkit
If an attacker breaks into a corporate database and deletes critical files, this is a attack against the ________ security goal. integrity
About how long was the Sony PlayStation Network offline as a result of the cyber attacks? 3 weeks
________ can spread through e-mail attachments. Both Viruses and Worms
________ may engage in commercial espionage against a firm. Both Competitors and National governments
You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called a ________ attack. (Pick the most precise answer.) phishing
Stealing credit card numbers is also known as ________. carding
Terrorists can use IT to ________. Both destroy utilities and finance their terrorism
What type of employee is the most dangerous when it comes to internal IT attacks? IT security professional
Traditional hackers are motivated by ________. All of these
________ are programs that attach themselves to legitimate programs. Viruses
Some ________ can jump directly between computers without human intervention. worms
Countries would engage in cyberwar ________. Both before a physical attack and after a physical attack
To obtain IP addresses through reconnaissance, an attacker can use ________. a chain of attack computers
Most traditional external attackers were heavily motivated by ________. the thrill of breaking in
In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. extortion
A botmaster can remotely ________. Both fix a bug in the bots and update bots with new functionality
A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets. DoS
Sophisticated attacks often are difficult to identify amid the "noise" of many ________ attacks. script kiddie
Countries would engage in cyberwar ________. Both before a physical attack and after a physical attack
Which hacker group was likely involved in the Sony data breaches? LulzSec
Which of the following can be a type of spyware? Both A cookie and A keystroke logger
One of the two characterizations of expert hackers is ________. dogged persistence
Which type of program can hide itself from normal inspection and detection? Rootkit
If an attacker breaks into a corporate database and deletes critical files, this is a attack against the ________ security goal. integrity
A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice.) SYN Flooding
About how long was the Sony PlayStation Network offline as a result of the cyber attacks? 3 weeks
________ can spread through e-mail attachments. Both Viruses and Worms
You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called a ________ attack. (Pick the most precise answer.) phishing
Stealing credit card numbers is also known as ________. carding
Terrorists can use IT to ________. Both destroy utilities and finance their terrorism
What type of employee is the most dangerous when it comes to internal IT attacks? IT professional
Traditional hackers are motivated by ________. All of these
________ are programs that attach themselves to legitimate programs. Viruses
Some ________ can jump directly between computers without human intervention. worms
Countries would engage in cyberwar ________. Both before a physical attack and after a physical attack
To obtain IP addresses through reconnaissance, an attacker can use ________. a chain of attack computers
In a virus, the code that does damage is called the ________. payload
When a threat succeeds in causing harm to a business, this is called a ________. All of these
The dominant type of attacker today is the ________. career criminal
________ is the destruction of hardware, software, or data. Sabotage
Why did hackers attack Sony Corp? Because Sony was suing a fellow hacker
A program that gives the attacker remote access control of your computer is specifically called a ________. RAT
Mobile code usually is delivered through ________. Webpages
If a company wishes to prosecute people or companies that steal its trade secrets, it must take ________ precautions to protect those trade secrets. reasonable
A ________ is a small program that, after installed, downloads a larger attack program. Downloader
What were the approximate dollar losses for the series of data breaches against Sony Corp? $171 million
Which of the following is a type of countermeasure? Corrective
ICMP Echo messages are often used in ________. IP address scanning
________ is form of online fraud when bogus clicks are performed to charge the advertiser without creating potential new customers. Click fraud
Created by: Elmoremc22
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards