TEST 1 Flashcards

(30 cards)

1
Q
  1. If an attacker has physical access to a cable he/she can simply tap that cable and see all the data passing through the cable
A

Network eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is applied to control which computers can connect to the network. With this technology, it provides a list of acceptable MAC addresses to WAP

A

MAC ADDRESS FILTERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is used for building a local network that uses a standard communication protocol that is embedded in soft software devices.

A

ETHERNET NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A management and control protocol for IP. It delivers messages between hosts about the health of the network.

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It compares received traffic to a set of rules that define which traffic it will permit to pass through the firewall

A

PACKET FILTERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is responsible for maintaining communication between computers. It creates, maintains, and disconnects communication that takes place between processors over a network.

A

SESSION LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a gathering of information about a network for use in future attacks.

A

NETWORK RECONNAISSANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a suite of protocols designed to connect sites securely

A

IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is subject to direct attack from an outside source. Multi Layered defense is far more secure. The lone defense router can protect internal resources but is subject to attack itself.

A

BORDERS ROUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is responsible for transmitting information on computers connected to the same local area network (LAN). Device manufacturers assign each hardware device to a unique MAC address

A

DATA LINK LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack to overwhelm a server or network segment to the point it becomes unusable

A

DENIAL OF SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The PC operating system was disk-based, or DOS, and most software and data files migrated between PCs via floppy diskettes

A

1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The attacker might issue a command to access a file on a local or network drive and modify, delete, or overwrite it with new data

A

DATA MODIFICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attackers conduct direct attacks against specific targets such as specific organizations

A

DIRECT ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A program triggers such nuisances as pop-up ads and banners.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Economic damage or loss to the theft, destruction, or unauthorized manipulation of sensitive data

A

ATTACK AGAINST DATA INTEGRITY

17
Q

An executable program that attaches to or infects another executable program.

18
Q

It is a technical-sounding warning of serious vulnerabilities or damage.

19
Q

Research made early attempts to perform routine maintenance tasks on large networks using self-distributing code

20
Q

Malicious code attacks can broadcast sensitive information about a company or its customers

A

ATTACK THAT DAMAGE REPUTATION

21
Q

Is a deliberate system of principles to guide decisions and achieve rational outcomes

22
Q

The court’s right to hear a case of a wrong is committed in its territory or involves its citizenry

23
Q

The organizations must be able to demonstrate that the employees agreed to comply with the policy through act or affirmation

24
Q

Comprises a wide variety of laws that govern a nation or state and deals with the relationships and conflicts between organizational entities and people.

25
Is a set of rules decided by a particular state meant to keep the peace and security of society
LAW
26
Standards are met when organizations make sure that every employee knows what acceptable and unacceptable behavior is
DUE CARE
27
Encompasses family law, commercial law, and labor law and regulates the relationship between individuals and organizations
PRIVATE LAW
28
Socially acceptable behavior. It is based on cultural mores, fixed moral attitudes, or customs of a particular group
ETHICS
29
Is the legal obligation of an entity that extends beyond criminal or contract law. It includes the legal obligations to make restitution or to compensate for wrongs committed
LIABILITY
30
The organizations must be able to demonstrate that the relevant policy has been made readily available for review by the employees.
DUE CARE