Reading 7 Flashcards

(8 cards)

1
Q

Q2: The Conficker worm is notable because:
* It is Cuba’s first attempt at cyberwarfare.
* Computer experts have found it particularly difficult to eradicate.
* It is the fastest spreading worm of all time.
* All of the above.

A

Computer experts have found it particularly difficult to eradicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Q1: A program with a benign capability that conceals another, sinister purpose is called a:
* Virus.
* Worm.
* Trojan horse.
* Rogue.

A

Trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q3: The Internet worm was released by:
* John Barlow.
* Katie Hafner.
* John Markoff.
* Robert Morris, Jr.

A

Robert Morris, Jr.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q4: A software program that responds to commands sent by a command-and-control program located on an external computer is called a:
* Bot.
* Spoof.
* Virus.
* Worm.

A

Bot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q6: An intentional action designed to prevent legitimate users from making use of a computer service is called:
* A bombing run.
* A curtain closer.
* A denial-of-service attack.
* An electronic overdose.

A

A denial-of-service attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q5: Manipulating someone within an organization to gain access to confidential information is called:
* Diving.
* Hacking.
* Phreaking.
* Social engineering.

A

Social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q7: Anonymous is:
* An activist group that promotes the interests of the Recording Industry Association of America.
* A loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
* The name given to the People’s Liberation Army group that was responsible for more than 100 intrusions around the world.
* The name of the group that launched the Stuxnet worm.

A

A loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q8: A self-contained program that spreads through a computer network by exploiting security holes is called a:
* Rogue.
* Trojan horse.
* Virus.
* Worm.

A

Worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly