Chapter 3 Assessment Flashcards Preview

Fundamentals of Information Systems Security > Chapter 3 Assessment > Flashcards

Flashcards in Chapter 3 Assessment Deck (15)
Loading flashcards...
1

The main goal of a hacker is to steal or compro
mise IT assets and potentially steal data

True

2

Which of the following best describes intellectual
property?

All of the above --
A. The items a business has copyrighted
B. All patents owned by a business
C. The unique knowledge a business possesses
D. Customer lists

3

Which of the following terms best describes a
person with very little hacking skills?

Script kiddie

4

A(n) _____ is a software tool that is used to capture
packets from a network.

packet sniffer

5

Which type of attacks result in legitimate users
not having access to a system resource?

DDoS

6

A SYN flood attack floods a target with invalid or
half-open TCP connection requests.

True

7

Which of the following is an example of social
engineering. A. SQL injection
B. XML injection
C. Security design
D. Impersonation
E. All of the above

Impersonation

8

Which of the following security countermeasures
is best for end-point protection against malware?

All of the above--
A. Antivirus/anti-malware protection
B. Data leakage prevention
C. Standardized workstation and laptop images
D. Security awareness training

9

Wardriving involves looking for open or public
wireless networks

True

10

Which of the following impacts availability?

DDoS

11

Which type of attack involves capturing data
packets from a network and transmitting them
later to produce an unauthorized effect?

Replay

12

A(n) _____ is any action that could damage an
asset.

Threat

13

A(n) _____ is any weakness that makes it possible for a threat to cause harm to a computer or
network.

vulnerability

14

vulnerability

Which type of malware is a self-contained pro
gram that replicates and sends copies of itself to
other computers, generally across a network?

Worm

15

Which type of malware involves extorting the
user or organization into paying money to release
a decryption key?

Cryptolocker malware