click below
click below
Normal Size Small Size show me how
ITN266 Midterm
| Question | Answer |
|---|---|
| Most traditional external attackers were heavily motivated by ________. | the thrill of breaking in |
| In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. | extortion |
| A botmaster can remotely ________. | Both fix a bug in the bots and update bots with new functionality |
| ________ consists of activities that violate a company's IT use policies or ethics policies. | Abuse |
| A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets. | DoS |
| Sophisticated attacks often are difficult to identify amid the "noise" of many ________ attacks. | script kiddie |
| Countries would engage in cyberwar ________. | Both before a physical attack and after a physical attack |
| Which hacker group was likely involved in the Sony data breaches? | LulzSec |
| Watching someone type their password in order to learn the password is called ________. | shoulder surfing |
| Which of the following can be a type of spyware? | Both A cookie and A keystroke logger |
| One of the two characterizations of expert hackers is ________. | dogged persistence |
| Which type of program can hide itself from normal inspection and detection? | Rootkit |
| If an attacker breaks into a corporate database and deletes critical files, this is a attack against the ________ security goal. | integrity |
| About how long was the Sony PlayStation Network offline as a result of the cyber attacks? | 3 weeks |
| ________ can spread through e-mail attachments. | Both Viruses and Worms |
| ________ may engage in commercial espionage against a firm. | Both Competitors and National governments |
| You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called a ________ attack. (Pick the most precise answer.) | phishing |
| Stealing credit card numbers is also known as ________. | carding |
| Terrorists can use IT to ________. | Both destroy utilities and finance their terrorism |
| What type of employee is the most dangerous when it comes to internal IT attacks? | IT security professional |
| Traditional hackers are motivated by ________. | All of these |
| ________ are programs that attach themselves to legitimate programs. | Viruses |
| Some ________ can jump directly between computers without human intervention. | worms |
| Countries would engage in cyberwar ________. | Both before a physical attack and after a physical attack |
| To obtain IP addresses through reconnaissance, an attacker can use ________. | a chain of attack computers |
| Most traditional external attackers were heavily motivated by ________. | the thrill of breaking in |
| In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. | extortion |
| A botmaster can remotely ________. | Both fix a bug in the bots and update bots with new functionality |
| A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets. | DoS |
| Sophisticated attacks often are difficult to identify amid the "noise" of many ________ attacks. | script kiddie |
| Countries would engage in cyberwar ________. | Both before a physical attack and after a physical attack |
| Which hacker group was likely involved in the Sony data breaches? | LulzSec |
| Which of the following can be a type of spyware? | Both A cookie and A keystroke logger |
| One of the two characterizations of expert hackers is ________. | dogged persistence |
| Which type of program can hide itself from normal inspection and detection? | Rootkit |
| If an attacker breaks into a corporate database and deletes critical files, this is a attack against the ________ security goal. | integrity |
| A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice.) | SYN Flooding |
| About how long was the Sony PlayStation Network offline as a result of the cyber attacks? | 3 weeks |
| ________ can spread through e-mail attachments. | Both Viruses and Worms |
| You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called a ________ attack. (Pick the most precise answer.) | phishing |
| Stealing credit card numbers is also known as ________. | carding |
| Terrorists can use IT to ________. | Both destroy utilities and finance their terrorism |
| What type of employee is the most dangerous when it comes to internal IT attacks? | IT professional |
| Traditional hackers are motivated by ________. | All of these |
| ________ are programs that attach themselves to legitimate programs. | Viruses |
| Some ________ can jump directly between computers without human intervention. | worms |
| Countries would engage in cyberwar ________. | Both before a physical attack and after a physical attack |
| To obtain IP addresses through reconnaissance, an attacker can use ________. | a chain of attack computers |
| In a virus, the code that does damage is called the ________. | payload |
| When a threat succeeds in causing harm to a business, this is called a ________. | All of these |
| The dominant type of attacker today is the ________. | career criminal |
| ________ is the destruction of hardware, software, or data. | Sabotage |
| Why did hackers attack Sony Corp? | Because Sony was suing a fellow hacker |
| A program that gives the attacker remote access control of your computer is specifically called a ________. | RAT |
| Mobile code usually is delivered through ________. | Webpages |
| If a company wishes to prosecute people or companies that steal its trade secrets, it must take ________ precautions to protect those trade secrets. | reasonable |
| A ________ is a small program that, after installed, downloads a larger attack program. | Downloader |
| What were the approximate dollar losses for the series of data breaches against Sony Corp? | $171 million |
| Which of the following is a type of countermeasure? | Corrective |
| ICMP Echo messages are often used in ________. | IP address scanning |
| ________ is form of online fraud when bogus clicks are performed to charge the advertiser without creating potential new customers. | Click fraud |