Flashcards in Chapter 3 Assessment Deck (15)
The main goal of a hacker is to steal or compro
mise IT assets and potentially steal data
Which of the following best describes intellectual
All of the above --
A. The items a business has copyrighted
B. All patents owned by a business
C. The unique knowledge a business possesses
D. Customer lists
Which of the following terms best describes a
person with very little hacking skills?
A(n) _____ is a software tool that is used to capture
packets from a network.
Which type of attacks result in legitimate users
not having access to a system resource?
A SYN flood attack floods a target with invalid or
half-open TCP connection requests.
Which of the following is an example of social
engineering. A. SQL injection
B. XML injection
C. Security design
E. All of the above
Which of the following security countermeasures
is best for end-point protection against malware?
All of the above--
A. Antivirus/anti-malware protection
B. Data leakage prevention
C. Standardized workstation and laptop images
D. Security awareness training
Wardriving involves looking for open or public
Which of the following impacts availability?
Which type of attack involves capturing data
packets from a network and transmitting them
later to produce an unauthorized effect?
A(n) _____ is any action that could damage an
A(n) _____ is any weakness that makes it possible for a threat to cause harm to a computer or
Which type of malware is a self-contained pro
gram that replicates and sends copies of itself to
other computers, generally across a network?