Computer Fraud and Abuse Flashcards

1
Q

Which federal law amended Chapter 119 of Title 18, U.S. Code?

A

U.S. PATRIOT Act, Sec. 217: Interception of Computer Trespasser Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To determine whether scanning is illegal in your area, you should do which of the following?

A

Refer to State Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The U.S. Department of Justice defines a hacker as which of the following?

A

A person who accesses a computer or network without the owner’s permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What professional level security certification requires five years of experience and is designed to focus an applicant’s security-related managerial skills?

A

Certified Information Systems Security Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What specific term does the U.S Department of Justice use to label all illegal access to a computer or network systems?

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A written contract isn’t necessary when a friend recommends a client. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is OSCP?

A

Offensive Security Certified Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What organization disseminates research documents on the computer and network security worldwide at no cost?

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which federal law prohibits intercepting any communication, regardless of how it was transmitted?

A

Electronic Communication Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What policy, provided by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which organization issues the Top 25 list of software errors?

A

SANS institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?

A

Certified Ethical Hacker (CEH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Many experienced penetration testers will write a set of instructions that run in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

A

Scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

17
Q

As a security tester, you can make a network impenetrable

18
Q

What portion of your ISP contract might affect your ability to conduct a penetration test over the Internet?

A

Acceptable use policy

19
Q

Which federal law prohibits unauthorized access of classified information?

A

Computer Fruad and Abuse Act, Title 18

20
Q

How can you find out which computer crime laws are applicable in your state?

A

Contact your local law enforcement agencies

21
Q

If you run a program in New York City that uses network resources to the extent that a user is denied access to them, what type of law have you violated?

22
Q

What organization designates a person as a CISSP?

23
Q

What penetration model should a company use if they only want to allow the penetration testers partial or incomplete information regarding their network system?

24
Q

What type of testing procedure involves the testers analyzing the company’s security policy and procedures, and reporting any vulnerabilities to management?

A

Security Test

25
Penetration testing can create ehtical, technical, and privacy concerns for a company's management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?
Create a contractual agreement
26
A security tester should have which of the following attributes?
Good verbal and written communcation skills Good listening skills An interest in securing networks and computer systems Knowledge of networking and computer technology
27
A penetration tester is which of the following?
A security professional who's hired to break into a network to discover vulnerabilities
28
What professional security certification requires applicants to demonstrate hands-on abilities to earn thier certificate?
Offensive Security Certified Professional
29
What penetration model would likely provide a network diagram showing all the company's router, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?
White Box
30
What common term is used by security testing professionals to describe vulnerabilities in a network?
Holes