Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
14.01
Which of the following is a type of denial of service attack? A. Ping of Death B. Stacheldraht C. SYN flood D. All of the above |
Which of the following is a type of denial of service attack? A. Ping of Death B. Stacheldraht C. SYN flood D. All of the above |
|
14.02 Which is not a type of threat that can affect your network? A. Worm B. Phishing C. Access control list D. Rogue access point |
Which is not a type of threat that can affect your network? A. Worm B. Phishing C. Access control list D. Rogue access point |
|
14.03 Which type of virus impacts .COM, .EXE, and .DLL files? A. File viruses B. SYN flood C. Smurf D. Tribe Flood Network |
Which type of virus impacts .COM, .EXE, and .DLL files? A. File viruses (Though the attacks below may employ a virus or backdoor to create zombie nets, they are DoS attacks… and not machine-specific.) B. SYN flood C. Smurf D. Tribe Flood Network |
|
14.04 Which type of virus uses the Visual Basic macro-scripting language to perform malicious or mischievous functions in data files? A. IP spoofing B. File C. Macro D. None of the above |
Which type of virus uses the Visual Basic macro-scripting language to perform malicious or mischievous functions in data files? A. IP spoofing B. File C. Macro D. None of the above |
|
14.05 Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus? A. IP spoofing B. Multipartite C. Macro D. Boot sector |
Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus? A. IP spoofing B. Multipartite C. Macro D. Boot sector |
|
14.06 Which type of virus affects both the boot sector and files on a computer? A. Mulipartite B. Macro C. Tribe Flood Network 2000 (TFN2K) D. Smurf |
Which type of virus affects both the boot sector and files on a computer? A. Mulipartite B. Macro C. Tribe Flood Network 2000 (TFN2K) D. Smurf |
|
14.07 What is the main difference between a worm and a virus? A. Worms require user action for replication. B. Viruses do not require user intervention for replication. C. Worms can replicate without user intervention. D. None of the above |
What is the main difference between a worm and a virus? A. Worms require user action for replication. B. Viruses do not require user intervention for replication. C. Worms can replicate without user intervention. D. None of the above |
|
14.08 What kind of attack could a hacker use to target a network that tries to log in to some type of shared network resource? A. Packet sniffers B. Brute-force attack C. Worm D. Backdoor |
What kind of attack could a hacker use to target a network that tries to log in to some type of shared network resource? A. Packet sniffers B. Brute-force attack (This is the only attack type that “tries to log in.”) C. Worm D. Backdoor |
|
14.09 What type of security threat allows an attacker to learn your password through the use of an email or phone call? A. Phishing B. Trust-exploration attack C. Man-in-the-middle attack D. Rogue access point |
What type of security threat allows an attacker to learn your password through the use of an email or phone call? A. Phishing B. Trust-exploration attack C. Man-in-the-middle attack D. Rogue access point |
|
14.10 Which type of policy should be implemented to secure important company documents and materials when employees leave their workstations? A. Clean housekeeping B. Clean desk C. Security audit D. Proactive defense |
Which type of policy should be implemented to secure important company documents and materials when employees leave their workstations? A. Clean housekeeping B. Clean desk C. Security audit D. Proactive defense |
|
14.11 If you implement a set of policies and procedures that define corporate information as confidential and then train employees on these procedures prevents what type of attack? A. DoS B. Man-in-the-middle attacks C. Smurf D. Social engineering |
If you implement a set of policies and procedures that define corporate information as confidential and then train employees on these procedures prevents what type of attack? A. DoS B. Man-in-the-middle attacks C. Smurf D. Social engineering |
|
14.12 If an employee leaves a company voluntarily, what type of interview should be conducted? A. Entrance B. Application C. Exit D. Manager rating |
If an employee leaves a company voluntarily, what type of interview should be conducted? A. Entrance B. Application C. Exit D. Manager rating |
|
14.13 What defines the appropriate response to a security event on a network? A. Implementing security procedures B. Installing a new router C. Turning off the network D. HR policy for dress code |
What defines the appropriate response to a security event on a network? A. Implementing security procedures B. Installing a new router C. Turning off the network D. HR policy for dress code |
|
14.14 What type of virus works its way into the master boot record and changes the pointer to your operating system? A. DoD virus B. Boot-sector virus C. File-system virus D. Macro virus |
What type of virus works its way into the master boot record and changes the pointer to your operating system? A. DoD virus B. Boot-sector virus C. File-system virus D. Macro virus |
|
14.15 What process allows you to update your Windows-based operating system? A. Technet B. Windows Update C. Text message D. Hot fix |
What process allows you to update your Windows-based operating system? A. Technet B. Windows Update C. Text message D. Hot fix |
|
14.16 Why is it important to keep your system patched and up to date? A. To completely stop your need for security B. To increase the functionality of your applications C. To fix system vulnerabilities D. To make Windows completely safe and worry free |
Why is it important to keep your system patched and up to date? A. To completely stop your need for security B. To increase the functionality of your applications C. To fix system vulnerabilities D. To make Windows completely safe and worry free |
|
14.17 A network administrator wanting to assign passwords to network resources only would implement which type of security? A. Building password B. Group password C. Share-level security D. User-level security |
A network administrator wanting to assign passwords to network resources only would implement which type of security? A. Building password B. Group password C. Share-level security D. User-level security |
|
14.18 Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it? A. Update scan B. Signature-file scan C. Database scan D. Heuristic scan |
Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it? A. Update scan B. Signature-file scan C. Database scan D. Heuristic scan |
|
14.19 What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses? A. Definition files B. Email files C. .doc files D. .exe files |
What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses? A. Definition files B. Email files C. .doc files D. .exe files |
|
14.20 What type of scan can be done by an antivirus program? A. Emergency B. On-demand C. On-access D. All of the above |
What type of scan can be done by an antivirus program? A. Emergency B. On-demand C. On-access D. All of the above (Note that in the Emergency mode, only the AV and OS are running. All other applications are shut down. This is accessed via the AV’s emergency disk.) |
|
14.21 The Ping of Death and SYN floods are examples of what types of attack? |
Denial of service (DoS) |
|
14.22 How often should you update your virus definitions in your antivirus software? |
Once per week |
|
14.23 What is the U.S. Department of Defense standard for individual computers? |
Trusted computer system |
|
14.24 What type of virus attacks executable programs? |
A file virus |
|
14.25 What kind of tool could a hacker use to intercept traffic on your network? |
Packet sniffer |
|
14.26 What type of virus uses Microsoft’s Visual Basic scripting language? |
A macro virus |
|
14.27 What is it called when someone intercepts traffic on your network that’s intended for a different destination computer? |
Man-in-the-middle attack |
|
14.28 If someone installed a wireless router on your network without your knowledge, that would be called___________________. |
A rogue access point |
|
14.29 What software application can help automatically ensure that your Windows-based computers have the most current security patches? |
Windows Update |
|
14.30 The two different types of virus scans are ___________________. |
On-demand and on-access |