Deck 1: The Threat Environment
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/103
Play
Full screen (f)
Deck 1: The Threat Environment
1
About how long was the Sony PlayStation Network offline as a result of the cyber attacks?
A) 3 days
B) 3 weeks
C) 3 months
D) It never went down.
A) 3 days
B) 3 weeks
C) 3 months
D) It never went down.
B
2
The three common core goals of security are ________.
A) confidentiality, integrity, and availability
B) confidentiality, information, and availability
C) confidentiality, integrity, and authentication
D) confidentiality, information, and authorization
A) confidentiality, integrity, and availability
B) confidentiality, information, and availability
C) confidentiality, integrity, and authentication
D) confidentiality, information, and authorization
A
3
When a threat succeeds in causing harm to a business, this is called a ________.
A) breach
B) compromise
C) incident
D) All of the above
A) breach
B) compromise
C) incident
D) All of the above
D
4
Another name for safeguard is ________.
A) countermeasure
B) compromise
C) Both A and B
D) Neither A nor B
A) countermeasure
B) compromise
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
5
Threat environment consists of the types of attackers and attacks that companies face.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
6
Preventative countermeasures identify when a threat is attacking and especially when it is succeeding.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
7
The attack method used in the Sony data breaches was ________.
A) Cross-site scripting
B) SQL injection
C) Denial of service
D) None of the above
A) Cross-site scripting
B) SQL injection
C) Denial of service
D) None of the above
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
8
Most countermeasure controls are preventative controls.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
9
When a threat succeeds in causing harm to a business, this is a(n) ________.
A) breach
B) countermeasure
C) Both A and B
D) Neither A nor B
A) breach
B) countermeasure
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
10
Which hacker group was likely involved in the Sony data breaches?
A) LulzSec
B) Wikileaks
C) Chaos Club 7
D) L33t |\|3RD5
A) LulzSec
B) Wikileaks
C) Chaos Club 7
D) L33t |\|3RD5
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
11
What were the approximate dollar losses for the series of data breaches against Sony Corp?
A) $54 million
B) $171 million
C) $254 million
D) $1.6 billion
A) $54 million
B) $171 million
C) $254 million
D) $1.6 billion
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
12
Confidentiality means that attackers cannot change or destroy information.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
13
Detective countermeasures keep attacks from succeeding.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
14
Detective countermeasures identify when a threat is attacking and especially when it is succeeding.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is a type of countermeasure?
A) Detective
B) Corrective
C) Both A and B
D) Neither A nor B
A) Detective
B) Corrective
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following are types of countermeasures?
A) Preventative
B) Detective
C) Corrective
D) All of the above
A) Preventative
B) Detective
C) Corrective
D) All of the above
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
17
Preventative countermeasures keep attacks from succeeding.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
18
Why did hackers attack Sony Corp?
A) To test their technical skills
B) Because Sony was suing a fellow hacker
C) As part of a larger cyberwar exercise
D) Because Sony put a malicious rootkit on certain music disks
A) To test their technical skills
B) Because Sony was suing a fellow hacker
C) As part of a larger cyberwar exercise
D) Because Sony put a malicious rootkit on certain music disks
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
19
Most countermeasure controls are detective controls.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
20
If an attacker breaks into a corporate database and deletes critical files, this is a attack against the ________ security goal.
A) integrity
B) confidentiality
C) Both A and B
D) Neither A nor B
A) integrity
B) confidentiality
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
21
You accidentally find someone's password and use it to get into a system. This is hacking.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
22
________ is the destruction of hardware, software, or data.
A) Sabotage
B) Hacking
C) Extortion
D) Denial of Service
A) Sabotage
B) Hacking
C) Extortion
D) Denial of Service
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
23
Penalties for hacking are ________.
A) limited only if a hacker stole $1000
B) limited only if a hacker stole over $1,000,000
C) irrelevant of the amount stolen
D) none of the above
A) limited only if a hacker stole $1000
B) limited only if a hacker stole over $1,000,000
C) irrelevant of the amount stolen
D) none of the above
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
24
Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
25
In fraud, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
26
The terms "intellectual property" and "trade secret" are synonymous.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
27
The definition of hacking is "intentionally accessing a computer resource without authorization or in excess of authorization."
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
28
Someone sends you a "game." When you run it, it logs you into an IRS server. This is hacking.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
29
In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.
A) fraud
B) extortion
C) hacking
D) abuse
A) fraud
B) extortion
C) hacking
D) abuse
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
30
In hacking, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
31
Employees are very dangerous because they ________.
A) often have access to sensitive parts of the system
B) are trusted by companies
C) Both A and B
D) Neither A nor B
A) often have access to sensitive parts of the system
B) are trusted by companies
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
32
Misappropriation of assets is an example of employee financial theft.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
33
When considering penalties for hacking, motivation is irrelevant.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
34
________ consists of activities that violate a company's IT use policies or ethics policies.
A) Fraud
B) Extortion
C) Hacking
D) Abuse
A) Fraud
B) Extortion
C) Hacking
D) Abuse
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
35
The definition of hacking is "accessing a computer resource without authorization or in excess of authorization."
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
36
Employees pose an increased risk to organizations as they ofter have access to sensitive parts of systems.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
37
You have access to your home page on a server. By accident, you discover that if you hit a certain key, you can get into someone else's files. You spend just a few minutes looking around. This is hacking.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
38
What type of employee is the most dangerous when it comes to internal IT attacks?
A) Data entry clerks
B) Financial professionals
C) IT professionals
D) IT security professionals
A) Data entry clerks
B) Financial professionals
C) IT professionals
D) IT security professionals
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
39
Downloading pornography can lead to sexual harassment lawsuits.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
40
________ is a generic term for "evil software."
A) Virus
B) Worm
C) Malware
D) Threat
A) Virus
B) Worm
C) Malware
D) Threat
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
41
Rootkits replace legitimate programs and are considered a deeper threat than a set of programs called Trojan horses.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
42
You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called a ________ attack. (Pick the most precise answer.)
A) social engineering
B) a hoax
C) phishing
D) spear fishing
A) social engineering
B) a hoax
C) phishing
D) spear fishing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
43
You receive an e-mail that seems to come from a frequent customer. It contains specific information about your relationship with the customer. Clicking on a link in the message takes you to a website that seems to be your customer's website. However, the website is fake. This is ________. (Pick the most precise answer.)
A) social engineering
B) a hoax
C) phishing
D) spear fishing
A) social engineering
B) a hoax
C) phishing
D) spear fishing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
44
Some ________ can jump directly between computers without human intervention.
A) viruses
B) worms
C) Both A and B
D) Neither A nor B
A) viruses
B) worms
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
45
The fastest propagation occurs with some types of ________.
A) viruses
B) worms
C) Trojan horses
D) bots
A) viruses
B) worms
C) Trojan horses
D) bots
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
46
A Trojan horse is a program that hides itself by deleting a system file and taking on the system file's name.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
47
A program that gives the attacker remote access control of your computer is specifically called a ________.
A) Trojan horse
B) spyware program
C) cookie
D) RAT
A) Trojan horse
B) spyware program
C) cookie
D) RAT
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
48
In a virus, the code that does damage is called the ________.
A) exploit
B) compromise
C) payload
D) vector
A) exploit
B) compromise
C) payload
D) vector
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
49
Mobile code usually is delivered through ________.
A) webpages
B) e-mail
C) directly propagating worms
D) All of the above
A) webpages
B) e-mail
C) directly propagating worms
D) All of the above
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
50
Which type of program can hide itself from normal inspection and detection?
A) Trojan horse
B) Stealth Trojan
C) Spyware
D) Rootkit
A) Trojan horse
B) Stealth Trojan
C) Spyware
D) Rootkit
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
51
Most cookies are dangerous.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
52
________ are programs that attach themselves to legitimate programs.
A) Viruses
B) Worms
C) Both A and B
D) Neither A nor B
A) Viruses
B) Worms
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
53
________ can spread through e-mail attachments.
A) Viruses
B) Worms
C) Both A and B
D) Neither A nor B
A) Viruses
B) Worms
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
54
The definition of spam is "unsolicited commercial e-mail."
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
55
Most traditional external attackers were heavily motivated by ________.
A) the thrill of breaking in
B) making money through crime
C) Both A and B
D) Neither A nor B
A) the thrill of breaking in
B) making money through crime
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
56
________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer.)
A) Social engineering
B) Spam
C) E-mail attachment
D) Mobile code
A) Social engineering
B) Spam
C) E-mail attachment
D) Mobile code
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
57
Nonmobile malware can be on webpages that users download.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
58
Mobile code usually is contained in webpages.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following can be a type of spyware?
A) A cookie
B) A keystroke logger
C) Both A and B
D) Neither A nor B
A) A cookie
B) A keystroke logger
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
60
A ________ is a small program that, after installed, downloads a larger attack program.
A) Trojan horse
B) Trojan pony
C) Stub
D) Downloader
A) Trojan horse
B) Trojan pony
C) Stub
D) Downloader
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
61
Sending packets with false IP source addresses is called ________.
A) a IP address scanning attack
B) IP address spoofing
C) a port scanning attack
D) None of the above.
A) a IP address scanning attack
B) IP address spoofing
C) a port scanning attack
D) None of the above.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets.
A) virus
B) directly-propagating worm
C) DoS
D) bot
A) virus
B) directly-propagating worm
C) DoS
D) bot
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
63
In pretexting, an attacker calls claiming to be a certain person in order to ask for private information about that person.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
64
A botmaster can remotely ________.
A) fix a bug in the bots
B) update bots with new functionality
C) Both A and B
D) Neither A nor B
A) fix a bug in the bots
B) update bots with new functionality
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
65
Botnets usually have multiple owners over time.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
66
Most traditional external hackers cause extensive damage or commit theft for money.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
67
Most traditional external hackers do not cause extensive damage or commit theft for money.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
68
ICMP Echo messages are often used in ________.
A) IP address scanning
B) port scanning
C) Both A and B
D) Neither A nor B
A) IP address scanning
B) port scanning
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
69
Attackers cannot use IP address spoofing in port scanning attack packets.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
70
Attackers rarely use IP address spoofing to conceal their identities.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following are examples of social engineering?
A) Wearing a uniform to give the appearance that you work at a business
B) Gaining unauthorized access by following an authorized individual in to a business
C) None of the above
D) All of the above
A) Wearing a uniform to give the appearance that you work at a business
B) Gaining unauthorized access by following an authorized individual in to a business
C) None of the above
D) All of the above
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
72
Watching someone type their password in order to learn the password is called ________.
A) piggybacking
B) shoulder surfing
C) Both A and B
D) Neither A nor B
A) piggybacking
B) shoulder surfing
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
73
Social engineering is rarely used in hacking.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
74
To obtain IP addresses through reconnaissance, an attacker can use ________.
A) IP address spoofing
B) a chain of attack computers
C) Both A and B
D) Neither A nor B
A) IP address spoofing
B) a chain of attack computers
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
75
Following someone through a secure door for access without using an authorized ID card or pass code is called ________. (Choose the most specific answer.)
A) door hacking
B) social engineering
C) piggybacking
D) shoulder surfing
A) door hacking
B) social engineering
C) piggybacking
D) shoulder surfing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
76
In response to a chain of attack, victims can often trace the attack back to the final attack computer.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
77
The primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
78
Traditional hackers are motivated by ________.
A) thrill
B) validation of power
C) doing damage as a by-product
D) All of the above
A) thrill
B) validation of power
C) doing damage as a by-product
D) All of the above
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
79
Generally speaking, script kiddies have high levels of technical skills.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice.)
A) DoS
B) directly-propagating worm
C) distributed malware
D) SYN Flooding
A) DoS
B) directly-propagating worm
C) distributed malware
D) SYN Flooding
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck