Exam 1: Introduction and Security Trends

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Code Red Worm spread to 350,000 computers in just over a week. It took just 14 hours.

Free
(True/False)
4.8/5
(41)
Correct Answer:
Verified

False

There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker,it is a target of opportunity,or it is a target that was specified to be attacked by a larger criminal organization.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

What is a port scan?

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

B

As the level of sophistication of attacks has increased,

(Multiple Choice)
4.9/5
(36)

Explain the steps in minimizing possible avenues of attack.

(Essay)
4.8/5
(40)

What is the most common threat to information security in an organization?

(Multiple Choice)
5.0/5
(30)

Hackers who are able to discover new vulnerabilities and write code to exploit them are known as _______________.

(Short Answer)
4.8/5
(31)

According to the Computer Crime and Security Survey,the four types of attacks that increased from 2007 to 2008 were

(Multiple Choice)
4.9/5
(36)

The second step an administrator can take in minimizing possible avenues of attack is _______________.

(Short Answer)
4.9/5
(35)

The message "Hacked by Chinese," was left by the

(Multiple Choice)
4.9/5
(34)

Fifty years ago,few people had access to a computer system or network,so securing them was a relatively easy matter.

(True/False)
4.9/5
(35)

Choose 3 security incidents from the last 20 or so years and state the significance of the incident.

(Essay)
4.9/5
(29)

_______________ are people who attack networks with a political purpose in mind.

(Short Answer)
4.7/5
(27)

What is an unstructured threat?

(Multiple Choice)
4.9/5
(44)

There are a number of different threats to security,including viruses and worms,intruders,insiders,criminal organizations,terrorists,and information warfare conducted by foreign countries.

(True/False)
4.9/5
(36)

As the level of sophistication of attacks _________,the level of knowledge necessary to exploit vulnerabilities decreased.

(Short Answer)
4.9/5
(32)

The first step an administrator can take to reduce possible attacks is to

(Multiple Choice)
4.8/5
(32)

The first worm to attack the Internet was the _______________.

(Short Answer)
4.9/5
(34)

When users are unable to access information or the systems processing information,you may have suffered a

(Multiple Choice)
4.9/5
(34)

What are the three different types of hackers and what are their technical abilities?

(Essay)
4.8/5
(33)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)