Computer Fraud and Abuse Flashcards

1
Q

Which federal law amended Chapter 119 of Title 18, U.S. Code?

A

U.S. PATRIOT Act, Sec. 217: Interception of Computer Trespasser Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To determine whether scanning is illegal in your area, you should do which of the following?

A

Refer to State Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The U.S. Department of Justice defines a hacker as which of the following?

A

A person who accesses a computer or network without the owner’s permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What professional level security certification requires five years of experience and is designed to focus an applicant’s security-related managerial skills?

A

Certified Information Systems Security Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What specific term does the U.S Department of Justice use to label all illegal access to a computer or network systems?

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A written contract isn’t necessary when a friend recommends a client. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is OSCP?

A

Offensive Security Certified Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What organization disseminates research documents on the computer and network security worldwide at no cost?

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which federal law prohibits intercepting any communication, regardless of how it was transmitted?

A

Electronic Communication Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What policy, provided by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which organization issues the Top 25 list of software errors?

A

SANS institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?

A

Certified Ethical Hacker (CEH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Many experienced penetration testers will write a set of instructions that run in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

A

Scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

A

Black Box

17
Q

As a security tester, you can make a network impenetrable

A

False

18
Q

What portion of your ISP contract might affect your ability to conduct a penetration test over the Internet?

A

Acceptable use policy

19
Q

Which federal law prohibits unauthorized access of classified information?

A

Computer Fruad and Abuse Act, Title 18

20
Q

How can you find out which computer crime laws are applicable in your state?

A

Contact your local law enforcement agencies

21
Q

If you run a program in New York City that uses network resources to the extent that a user is denied access to them, what type of law have you violated?

A

Federal

22
Q

What organization designates a person as a CISSP?

A

ISC2

23
Q

What penetration model should a company use if they only want to allow the penetration testers partial or incomplete information regarding their network system?

A

Gray Box

24
Q

What type of testing procedure involves the testers analyzing the company’s security policy and procedures, and reporting any vulnerabilities to management?

A

Security Test

25
Q

Penetration testing can create ehtical, technical, and privacy concerns for a company’s management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

A

Create a contractual agreement

26
Q

A security tester should have which of the following attributes?

A

Good verbal and written communcation skills
Good listening skills
An interest in securing networks and computer systems
Knowledge of networking and computer technology

27
Q

A penetration tester is which of the following?

A

A security professional who’s hired to break into a network to discover vulnerabilities

28
Q

What professional security certification requires applicants to demonstrate hands-on abilities to earn thier certificate?

A

Offensive Security Certified Professional

29
Q

What penetration model would likely provide a network diagram showing all the company’s router, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

A

White Box

30
Q

What common term is used by security testing professionals to describe vulnerabilities in a network?

A

Holes