Deck 1: Introduction and Security Trends

ملء الشاشة (f)
exit full mode
سؤال
What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988?

A)The Code Red Worm
B)The Morris Worm
C)The Slammer Worm
D)The Jester Worm
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Why is the Morris worm significant?

A)It placed embarrassing text on people's screens.
B)This was the first large-scale attack on the Internet.
C)It was the very first virus on the Internet.
D)It attacked the Windows operating system.
سؤال
When information is disclosed to individuals not authorized to see it,you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
سؤال
Information warfare is

A)A video game
B)Warfare conducted against information and information processing equipment
C)A type of malicious code that "declares war" on a network by formatting the hard drives on computers and copying itself to other computers
D)A weapon that uses microwaves to destroy enemy vehicles
سؤال
Who is Kevin Mitnick?

A)He used social engineering,sniffers,and cloned cell phones to gain unauthorized access to networks belonging to Motorola,Novell,Fujitsu,and Sun Microsystems.
B)He made bank transfers from St.Petersburg using the Citibank cash management system.
C)He gained access to a loop carrier system operated by NYNEX and cut off FAA control tower and emergency services.
D)He developed the "Love Bug" love-letter virus that spread to 45 million people.
سؤال
What is an unstructured threat?

A)An elite hacker who mounts an attack against a specific target
B)A poorly engineered building
C)A type of malicious code that formats the hard drive on a computer.
D)An attack that is uncoordinated,nonspecific,and lasts a short amount of time
سؤال
A successful attack on a network may adversely impact security in all the following ways EXCEPT:

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability While the loss of functionality may also result,the main target of attacks from a security perspective will be against the confidentiality,integrity,and availability of information.Oddly enough,a loss of functionality may increase the security of the network.
سؤال
If the system is infected with a time bomb,it means that

A)It has a virus that will do physical damage to the computer.
B)It has equipment that is coming close to the end of its life cycle.
C)It has a piece of malicious code that will be triggered at a certain time.
D)It has a piece of malicious code that will be triggered by a certain user activity.
سؤال
A ping sweep

A)Is a method of clearing your network
B)Sends ICMP echo requests to the target machine
C)Determines what services are running on a system
D)Is an exploit that creates a denial of service (DoS)using ICMP echo requests
سؤال
What is the most common threat to information security in an organization?

A)Computer viruses
B)Power surges
C)Forgotten passwords
D)SPAM
سؤال
What is an elite hacker?

A)A hacker with a high level of technical ability
B)A hacker who has a wealthy background,and who is politically motivated
C)A hacker who has elitist ideas and hacks for political purposes
D)A hacker who searches for scripts and ready-made tools to use for attacks
سؤال
According to the Computer Crime and Security Survey,the four types of attacks that increased from 2007 to 2008 were

A)Viruses,insider abuse,laptop theft,and unauthorized access
B)Unauthorized access,theft/loss of proprietary information,misuse of web applications,and DNS attacks
C)Viruses,insider abuse,misuse of web applications,and DNS attacks
D)Laptop theft,unauthorized access,and theft/loss of proprietary information
سؤال
What is a structured threat?

A)An attack that uses coordination,insiders,and lasts for a long period of time
B)A type of malicious code that formats the hard drive on a computer
C)An attempt to weaken infrastructure
D)An official threat from a terrorist organization
سؤال
As the level of sophistication of attacks has increased,

A)The level of knowledge necessary to exploit vulnerabilities has increased
B)The level of knowledge necessary to exploit vulnerabilities has decreased
C)The level of skill necessary to exploit vulnerabilities has increased
D)The amount of exploit software available on the Internet has decreased
سؤال
What is a port scan?

A)Identifies what ports can be used to smuggle information across borders
B)Identifies ports that are open and services that are running
C)Identifies the USB,parallel,and serial ports that can be used to connect to the system
D)Identifies the IP addresses of computers on the network
سؤال
When information is modified by individuals not authorized to change it you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
سؤال
The term "script kiddies" refers to

A)A hacker of low-end technical ability
B)A children's television show
C)A type of video game
D)An Internet site for peer-to-peer music sharing
سؤال
In April 2009,Homeland Security Secretary Janet Napolitano told reporters

A)Organized crime made attempts to break into the US electric power grid
B)Hacktivists made attempts to break into the US electric power grid
C)Terrorists made attempts to break into the US electric power grid
D)China and Russia made attempts to break into the US electric power grid
سؤال
The term "hacktivist" refers to

A)A hacker who works for the government
B)A hacker with low technical ability
C)A hacker who is motivated by a political agenda
D)A hacker who can write scripts
سؤال
What was the Slammer Worm/Virus?

A)It was a macro virus that spread by emailing the first 50 people in the victim's address book with the subject: Important message.
B)The first Internet worm that "slammed" the Internet,created by a graduate student at Cornell University in 1988.
C)Malware that exploited Microsoft SQL Server and spread across the world in just 10 minutes.
D)Malware that would "slam" shut your computer by not allowing you to log in.
سؤال
The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small,tightly contained mainframes to a highly widespread network of much larger systems.
سؤال
There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker,it is a target of opportunity,or it is a target that was specified to be attacked by a larger criminal organization.
سؤال
The first step an administrator can take to reduce possible attacks is to

A)Ensure all patches for the operating system and applications are installed
B)Install a firewall
C)Install anti-spyware software
D)Configure an intrusion detection system
سؤال
There are a number of different threats to security,including viruses and worms,intruders,insiders,criminal organizations,terrorists,and information warfare conducted by foreign countries.
سؤال
Each of the infected systems became part of what is known as a bot network,which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users,as a result of the

A)Slammer Worm
B)Morris Worm
C)Conficker
D)Melissa Worm
سؤال
Viruses have no useful purpose.
سؤال
As the level of sophistication of attacks _________,the level of knowledge necessary to exploit vulnerabilities decreased.
سؤال
The Code Red Worm spread to 350,000 computers in just over a week.
It took just 14 hours.
سؤال
The steps an attacker takes in attempting to penetrate a targeted network are extremely different from the ones that a security consultant performing a penetration test would take.
سؤال
One significant trend observed over the last several years has been the decrease in the number of computer attacks by nonaffiliated intruders as opposed to attacks by organized hacking groups,criminal organizations,or nations.
سؤال
Vladimir Levin was able to steal $10 Million from _______________ by using its cash management system.
سؤال
In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.
سؤال
The message "Hacked by Chinese," was left by the

A)Melissa virus
B)Love Letter virus
C)Slammer Worm
D)Code Red Worm
سؤال
The first worm to attack the Internet was the _______________.
سؤال
One of the hardest threats that the security professional will have to deal with is the elite hacker.
The insider threat is the hardest one to deal with.They already have access to the organization and its assets.
سؤال
The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed.
سؤال
_______________ are people who attack networks with a political purpose in mind.
سؤال
Fifty years ago,few people had access to a computer system or network,so securing them was a relatively easy matter.
سؤال
Hackers who are able to discover new vulnerabilities and write code to exploit them are known as _______________.
سؤال
When users are unable to access information or the systems processing information,you may have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of authentication
D)Loss of availability
سؤال
Explain the steps in minimizing possible avenues of attack.
سؤال
The two general reasons a particular computer system is attacked: either it is specifically targeted by the attacker,or it is a(n)_______________.
سؤال
What are the three types of losses that can result from an attack on information?
سؤال
Briefly explain the steps in an attack.
سؤال
Choose 3 security incidents from the last 20 or so years and state the significance of the incident.
سؤال
_______________ are hackers who do not have enough technical skill to discovery vulnerabilities on their own,and cannot write their own scripts to exploit vulnerabilities.
سؤال
What are the three different types of hackers and what are their technical abilities?
سؤال
A hacker will run a(n)_______________ in order to determine what services are running on the target machine.
سؤال
The second step an administrator can take in minimizing possible avenues of attack is _______________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction and Security Trends
1
What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988?

A)The Code Red Worm
B)The Morris Worm
C)The Slammer Worm
D)The Jester Worm
B
2
Why is the Morris worm significant?

A)It placed embarrassing text on people's screens.
B)This was the first large-scale attack on the Internet.
C)It was the very first virus on the Internet.
D)It attacked the Windows operating system.
B
3
When information is disclosed to individuals not authorized to see it,you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
A
4
Information warfare is

A)A video game
B)Warfare conducted against information and information processing equipment
C)A type of malicious code that "declares war" on a network by formatting the hard drives on computers and copying itself to other computers
D)A weapon that uses microwaves to destroy enemy vehicles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
5
Who is Kevin Mitnick?

A)He used social engineering,sniffers,and cloned cell phones to gain unauthorized access to networks belonging to Motorola,Novell,Fujitsu,and Sun Microsystems.
B)He made bank transfers from St.Petersburg using the Citibank cash management system.
C)He gained access to a loop carrier system operated by NYNEX and cut off FAA control tower and emergency services.
D)He developed the "Love Bug" love-letter virus that spread to 45 million people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is an unstructured threat?

A)An elite hacker who mounts an attack against a specific target
B)A poorly engineered building
C)A type of malicious code that formats the hard drive on a computer.
D)An attack that is uncoordinated,nonspecific,and lasts a short amount of time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
7
A successful attack on a network may adversely impact security in all the following ways EXCEPT:

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability While the loss of functionality may also result,the main target of attacks from a security perspective will be against the confidentiality,integrity,and availability of information.Oddly enough,a loss of functionality may increase the security of the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
8
If the system is infected with a time bomb,it means that

A)It has a virus that will do physical damage to the computer.
B)It has equipment that is coming close to the end of its life cycle.
C)It has a piece of malicious code that will be triggered at a certain time.
D)It has a piece of malicious code that will be triggered by a certain user activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ping sweep

A)Is a method of clearing your network
B)Sends ICMP echo requests to the target machine
C)Determines what services are running on a system
D)Is an exploit that creates a denial of service (DoS)using ICMP echo requests
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
10
What is the most common threat to information security in an organization?

A)Computer viruses
B)Power surges
C)Forgotten passwords
D)SPAM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is an elite hacker?

A)A hacker with a high level of technical ability
B)A hacker who has a wealthy background,and who is politically motivated
C)A hacker who has elitist ideas and hacks for political purposes
D)A hacker who searches for scripts and ready-made tools to use for attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
12
According to the Computer Crime and Security Survey,the four types of attacks that increased from 2007 to 2008 were

A)Viruses,insider abuse,laptop theft,and unauthorized access
B)Unauthorized access,theft/loss of proprietary information,misuse of web applications,and DNS attacks
C)Viruses,insider abuse,misuse of web applications,and DNS attacks
D)Laptop theft,unauthorized access,and theft/loss of proprietary information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is a structured threat?

A)An attack that uses coordination,insiders,and lasts for a long period of time
B)A type of malicious code that formats the hard drive on a computer
C)An attempt to weaken infrastructure
D)An official threat from a terrorist organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
14
As the level of sophistication of attacks has increased,

A)The level of knowledge necessary to exploit vulnerabilities has increased
B)The level of knowledge necessary to exploit vulnerabilities has decreased
C)The level of skill necessary to exploit vulnerabilities has increased
D)The amount of exploit software available on the Internet has decreased
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is a port scan?

A)Identifies what ports can be used to smuggle information across borders
B)Identifies ports that are open and services that are running
C)Identifies the USB,parallel,and serial ports that can be used to connect to the system
D)Identifies the IP addresses of computers on the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
16
When information is modified by individuals not authorized to change it you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
17
The term "script kiddies" refers to

A)A hacker of low-end technical ability
B)A children's television show
C)A type of video game
D)An Internet site for peer-to-peer music sharing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
18
In April 2009,Homeland Security Secretary Janet Napolitano told reporters

A)Organized crime made attempts to break into the US electric power grid
B)Hacktivists made attempts to break into the US electric power grid
C)Terrorists made attempts to break into the US electric power grid
D)China and Russia made attempts to break into the US electric power grid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
19
The term "hacktivist" refers to

A)A hacker who works for the government
B)A hacker with low technical ability
C)A hacker who is motivated by a political agenda
D)A hacker who can write scripts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
20
What was the Slammer Worm/Virus?

A)It was a macro virus that spread by emailing the first 50 people in the victim's address book with the subject: Important message.
B)The first Internet worm that "slammed" the Internet,created by a graduate student at Cornell University in 1988.
C)Malware that exploited Microsoft SQL Server and spread across the world in just 10 minutes.
D)Malware that would "slam" shut your computer by not allowing you to log in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
21
The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small,tightly contained mainframes to a highly widespread network of much larger systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
22
There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker,it is a target of opportunity,or it is a target that was specified to be attacked by a larger criminal organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
23
The first step an administrator can take to reduce possible attacks is to

A)Ensure all patches for the operating system and applications are installed
B)Install a firewall
C)Install anti-spyware software
D)Configure an intrusion detection system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
24
There are a number of different threats to security,including viruses and worms,intruders,insiders,criminal organizations,terrorists,and information warfare conducted by foreign countries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
25
Each of the infected systems became part of what is known as a bot network,which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users,as a result of the

A)Slammer Worm
B)Morris Worm
C)Conficker
D)Melissa Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
26
Viruses have no useful purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
27
As the level of sophistication of attacks _________,the level of knowledge necessary to exploit vulnerabilities decreased.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
28
The Code Red Worm spread to 350,000 computers in just over a week.
It took just 14 hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
29
The steps an attacker takes in attempting to penetrate a targeted network are extremely different from the ones that a security consultant performing a penetration test would take.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
30
One significant trend observed over the last several years has been the decrease in the number of computer attacks by nonaffiliated intruders as opposed to attacks by organized hacking groups,criminal organizations,or nations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
31
Vladimir Levin was able to steal $10 Million from _______________ by using its cash management system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
32
In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
33
The message "Hacked by Chinese," was left by the

A)Melissa virus
B)Love Letter virus
C)Slammer Worm
D)Code Red Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
34
The first worm to attack the Internet was the _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
35
One of the hardest threats that the security professional will have to deal with is the elite hacker.
The insider threat is the hardest one to deal with.They already have access to the organization and its assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
36
The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
37
_______________ are people who attack networks with a political purpose in mind.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
38
Fifty years ago,few people had access to a computer system or network,so securing them was a relatively easy matter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
39
Hackers who are able to discover new vulnerabilities and write code to exploit them are known as _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
40
When users are unable to access information or the systems processing information,you may have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of authentication
D)Loss of availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain the steps in minimizing possible avenues of attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
42
The two general reasons a particular computer system is attacked: either it is specifically targeted by the attacker,or it is a(n)_______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are the three types of losses that can result from an attack on information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly explain the steps in an attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
45
Choose 3 security incidents from the last 20 or so years and state the significance of the incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
46
_______________ are hackers who do not have enough technical skill to discovery vulnerabilities on their own,and cannot write their own scripts to exploit vulnerabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
47
What are the three different types of hackers and what are their technical abilities?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
48
A hacker will run a(n)_______________ in order to determine what services are running on the target machine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
49
The second step an administrator can take in minimizing possible avenues of attack is _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.