Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

N+

CH. 14 chapter review

QuestionQuestionAnswerAnswer
3. which type of virus impacts files with the filename extensions .com, .exe, and .d11? A. File virus B. SYN flood C. Smurf D. Tribe Flood Network 1. D. A denial of service (DoS) attack prevents users from accessing the system. All of the options are possible denial of service attacks. 3
4. In which type of attack does the attacker scan for networks using a high-powered antenna connected to a wireless laptop? A. War driving B. Evil twin C. WEP cracking D. WPA cracking 4. A. In war driving, the attacker simply drives around with a high-powered antenna connected to a wireless laptop scanning for networks. 4
5. Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus? A.IP spoofing B. Multipartite C. Macro D. Boot sector 5 5. D. These are all examples of boot-sector viruses that get into the master boot record.A boot-sector virus will overwrite the boot sector, thereby making it look as if there is no pointer to your operating system. When you power up the computer, 5. you will see a Missing Operating System or Hard Disk Not Found error message.
6. Which type of virus affects both the boot sector and files on a computer? A. Multipartite B. Macro C. Tribe Flood Network 2000 (TFN2K) D. Smurf 6 6. A. A multipartite virus is one that affects both the boot sector and files on your computer. 6
7. What is the main difference between a worm and a virus? A. Worms require user action for replication B. Viruses do not require user intervention for replication C. Worms can replicate without user intervention D. None of the above 7 7. C. A worm can actively replicate itself without user intervention, whereas a virus can be activated and spread only if a user opens an application. 7
8. What kind of attack involves the hacker attempting all combinations or characters for a password to gain access? a. packet sniffers b. brute-force attack c. worm d. backdoor 8 8. B. A brute-force attack is a software-related attack that employs a program that is running on a targeted network and tries to log in to some type of shared network resource like a server. 8
9. What type of security threat allows an attacker to learn your password through the use of an email or phone call? A. Phishing B. Trust-exploration attack C. Man-in-the-middle attack D. Rogue access point 9 9. A Social engineering, or phishing, refers to the act of attempting to illegally obtain sensitive info by pretending to be a credible source. Phishing usually takes one of 2 forms: email or phone call 9
10. Which type of policy should be implemented to secure important company documents and materials when employees leave their workstations? A. Clean housekeeping B. Clean desk C. Security audit D. Proactive defense 10 10. B. A clean-desk policy means that all important documents, such as books, schematics,confidential letters, etc. are removed from the desk (and locked away) when employees leave their workstation. 10
11. If you implement a set of policies and procedures that define corporate info as confidential and then train employees on these procedures, what type of attack can you prevent? A. DoS B. Man-in-the-middle- attacks C. Smurf D. Social engineering 11 11. D. It is important to train all employees by informing them that people may try to call and email them to gather info to attack the company. This is called phishing or social engineering. 11
12. What type of wireless frame populates the display when someone is scanning for wireless networks? A. Probe response B. Beacon C. SSID D. Discovery 12 12. B. When you set the AP to not broadcast the SSID, it will remove the SSID from packets called beacons (these are the packets that populate the display when you scan for networks) but it will still be present in many other packet types. 12
13. What defines the appropriate response to a security event on a network? A. Implementing security procedures B. Installing a new router C. Turning off the network D. Implementing an HR policy for dress code 13 13. A. A security procedure defines the appropriate repines to a security event on your network 13
14. Which of the following security mechanisms has been compromised? A. WEP B. 802.11i C. WPA-2 D. RADIUS 14 14. A. Soon after its adoption as a security measure,it was discovered that due to a weakness in the way the algorithm was employed, programs that became widely available on the Internet could be used to crack the WEP key. 14
15. What process allows you to update your Windows-based operating system? A. Technet B. Windows Update C. Text message D. Hotfix 15 15. B. Windows Update is a utility that is typically automatically installed when you install Windows. The update engine will periodically scan your system for the version of Windows components you have installed and compare them to the most current 15. versions available from Microsoft. If your software is out-of-date,a Windows Update dialog box will appear, asking if you want to install the software updates.
16. Why is it important to keep your system patched and up-to-date? A. To completely stop your need for security B. To increase the functionality of your applications C. To fix system vulnerabilities D. To make Windows completely safe and worry free 16 16. C. With so much code written for applications and operating systems, developers go back after the initial release to fix any problems that are uncovered. These fixes are released as hot fixes or patches. 16
17. Which value does a wireless station use to choose an access point? A. Signal-to-noise ratio B. MAC address C. SSID D. Channel number 17 17. C. Wireless stations (laptops, PDAs, etc.) choose an access point with which to connect by SSID and not by channel, MAC address, or signal-to-noise ratio. 17
18. Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it? A. Update scan B. Signature-file scan C. Database scan D. Heuristic scan 18 18. D. Heuristic scanning allows for this type of scanning. The engine looks for suspicious activity that might indicate a virus. 18
19. What type of files need to be updated in order for you antivirus program to have the latest info about attacks and viruses? A. Definition files B. Email files C. DOC (.doc) files D. EXE (.exe) files 19 19. A. Every week, you need to update your list of known viruses-called the virus definition files. you can do this manually or automatically through the manufacturer's website. you can use a staging server within your company to download and then 19. distribute the updates, or you can set up each computer to download updates.
20. What type of scan can be done by an antivirus program? A. Emergency B. In-demand C. On-access D. All of the above 20 20. D. An antivirus program examines the computer suspected of being infected and eradicates any viruses it finds using any of these methods. 20
1. which of the following is a type of denial of service attack? A. Ping of Death B. Stacheldraht C. SYN flood D. All of the above 1. D. A denial of service (DoS) attack prevents users from accessing the system. All of the options are possible denial of service attacks. 1
2. Which is not a type of threat that can affect your network? A. Worm B. Phishing C. Access control list D. Rogue access point 2. C. Worms, phishing, and rogue access points are all threats that may adversely affect a network. 2
Created by: baumsquad
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards