Deck 3: Network and Computer Attacks

Full screen (f)
exit full mode
Question
IDS stands for ____.

A)Intrusion Detection System
B)Information Dissemination System
C)Information Destruction System
D)Intruder Dispersal System
Use Space or
up arrow
down arrow
to flip the card.
Question
The most effective approach to protect a network from malware being introduced is to conduct structured training of all employees and management.
Question
Malware programs cannot be detected by antivirus programs.
Question
____ is concerned with the security of computers or devices that are part of a network infrastructure.

A)Attack security
B)Cybercrime
C)Computer security
D)Network security
Question
A ____ is a computer program that replicates and propagates itself without having to attach itself to a host.

A)virus
B)Trojan
C)worm
D)shell
Question
____ sometimes displays a banner that notifies the user of its presence.

A)Spyware
B)Adware
C)Webware
D)Malware
Question
In a ____ attack, a programmer finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

A)buffer overflow
B)DoS
C)DDoS
D)session hijacking
Question
Trojan Programs can install a backdoor or ____ on a computer.

A)rootkit
B)shell
C)worm
D)macro virus
Question
The two most popular spyware and adware removal programs are ____ and Ad-Aware.

A)Zone Alarm
B)BlackIce
C)McAfee Desktop Firewall
D)SpyBot
Question
The virus signature file is maintained by ____ software.

A)antivirus
B)keylogger
C)remote control
D)firewall
Question
One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.

A)macro viruses
B)worms
C)spyware programs
D)Trojan programs
Question
A ____ can replicate itself, usually through an executable program attached to an e-mail.

A)shell
B)virus
C)keylogger
D)rootkit
Question
Computer crime is the fastest growing type of crime worldwide.
Question
____ is a remote control program.

A)Slammer
B)BlackIce
C)Symantec pcAnywhere
D)Zone Alarm
Question
A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.

A)toolbox
B)rootkit
C)shell
D)macro virus
Question
The average home user or small-business owner doesn't typically use Telnet.
Question
Macro viruses are hard to create.
Question
A ____ attack prevents legitimate users from accessing network resources.

A)buffer overflow
B)session hijacking
C)social engineering
D)DoS
Question
To represent 0 to 63 characters you need only ____ bits.

A)four
B)five
C)six
D)seven
Question
____ commands that open and close files can be used in destructive ways.

A)Macro
B)Firewall
C)Keylogger
D)Adware
Question
Software keyloggers behave like ____ and are loaded on a computer.

A)Trojan programs
B)viruses
C)shells
D)firewalls
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
hardware keylogger
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
common Trojan program
Question
PKI stands for ____.

A)Public Key Infrastructure
B)Private Key Infrastructure
C)Protected Key Infrastructure
D)Primary Key Infrastructure
Question
____________________ is malicious software, such as a virus,worm, or Trojan program, introduced to a network for just that reason.
Question
Antivirus software compares ____________________ of known viruses against the files on the computer; if there's a match, the software warns you that the program or file is infected.
Question
Which of the following provides the most secure method of securing a company's assets?

A)rotary locks
B)combination locks
C)card access
D)deadbolt locks
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
executable piece of programming code that should not appear in an e-mail attachment
Question
A(n) ____________________ is a virus encoded as a macro in programs that support a macro programming language, such as Visual Basic for Applications (VBA).
Question
____ are devices or computer programs that can be used to capture keystrokes on a computer.

A)Viruses
B)Keyloggers
C)Macro viruses
D)Firewalls
Question
In the ____ attack, the attacker simply creates an ICMP packet that's larger than the maximum allowed 65,535 bytes.

A)DoS
B)Ping of Death
C)buffer overflow
D)session hijacking
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
worm that uses UDP port 8998 to contact the attacker's server
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
type of DoS attack
Question
____________________ or rootkits are computer programs that give attackers a means of regaining access to the attacked computer later.
Question
____________________ is defined as securing a stand-alone computer that's not part of a network infrastructure.
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
2005 hybrid worm with backdoor capabilities spread by mass e-mailing and exploiting Windows vulnerabilities
Question
____ enables an attacker to join a TCP session and make both parties think he or she is the other party.

A)A DoS attack
B)The Ping of Death
C)A buffer overflow attack
D)Session hijacking
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
most infamous macro virus
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
purported to have shut down more than 13,000 ATMs
Question
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
attack side of a sophisticated cybercrime toolkit that spreads when Web surfers visit a hacked Web site hosting the malware
Question
Why is "attach" a key word when talking about viruses?
Question
What is Back Orifice?
Question
How does a buffer overflow attack work?
Question
Describe an example of a macro virus.
Question
Some security professionals use fear tactics to scare users into complying with security measures. Is this a good tactic?
Question
What is spyware?
Question
What is the most important recommendation that should be made to a client to help prevent viruses from being introduced into corporate networks?
Question
What types of ports do successful Trojan programs commonly use?
Question
What is the difference between spyware and adware?
Question
What is a DDoS attack?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Network and Computer Attacks
1
IDS stands for ____.

A)Intrusion Detection System
B)Information Dissemination System
C)Information Destruction System
D)Intruder Dispersal System
A
2
The most effective approach to protect a network from malware being introduced is to conduct structured training of all employees and management.
True
3
Malware programs cannot be detected by antivirus programs.
False
4
____ is concerned with the security of computers or devices that are part of a network infrastructure.

A)Attack security
B)Cybercrime
C)Computer security
D)Network security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A ____ is a computer program that replicates and propagates itself without having to attach itself to a host.

A)virus
B)Trojan
C)worm
D)shell
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
____ sometimes displays a banner that notifies the user of its presence.

A)Spyware
B)Adware
C)Webware
D)Malware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In a ____ attack, a programmer finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

A)buffer overflow
B)DoS
C)DDoS
D)session hijacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Trojan Programs can install a backdoor or ____ on a computer.

A)rootkit
B)shell
C)worm
D)macro virus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The two most popular spyware and adware removal programs are ____ and Ad-Aware.

A)Zone Alarm
B)BlackIce
C)McAfee Desktop Firewall
D)SpyBot
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The virus signature file is maintained by ____ software.

A)antivirus
B)keylogger
C)remote control
D)firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.

A)macro viruses
B)worms
C)spyware programs
D)Trojan programs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ can replicate itself, usually through an executable program attached to an e-mail.

A)shell
B)virus
C)keylogger
D)rootkit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Computer crime is the fastest growing type of crime worldwide.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
____ is a remote control program.

A)Slammer
B)BlackIce
C)Symantec pcAnywhere
D)Zone Alarm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.

A)toolbox
B)rootkit
C)shell
D)macro virus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The average home user or small-business owner doesn't typically use Telnet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Macro viruses are hard to create.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A ____ attack prevents legitimate users from accessing network resources.

A)buffer overflow
B)session hijacking
C)social engineering
D)DoS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
To represent 0 to 63 characters you need only ____ bits.

A)four
B)five
C)six
D)seven
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
____ commands that open and close files can be used in destructive ways.

A)Macro
B)Firewall
C)Keylogger
D)Adware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Software keyloggers behave like ____ and are loaded on a computer.

A)Trojan programs
B)viruses
C)shells
D)firewalls
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
hardware keylogger
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
common Trojan program
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
PKI stands for ____.

A)Public Key Infrastructure
B)Private Key Infrastructure
C)Protected Key Infrastructure
D)Primary Key Infrastructure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
____________________ is malicious software, such as a virus,worm, or Trojan program, introduced to a network for just that reason.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Antivirus software compares ____________________ of known viruses against the files on the computer; if there's a match, the software warns you that the program or file is infected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following provides the most secure method of securing a company's assets?

A)rotary locks
B)combination locks
C)card access
D)deadbolt locks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
executable piece of programming code that should not appear in an e-mail attachment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ is a virus encoded as a macro in programs that support a macro programming language, such as Visual Basic for Applications (VBA).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____ are devices or computer programs that can be used to capture keystrokes on a computer.

A)Viruses
B)Keyloggers
C)Macro viruses
D)Firewalls
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
In the ____ attack, the attacker simply creates an ICMP packet that's larger than the maximum allowed 65,535 bytes.

A)DoS
B)Ping of Death
C)buffer overflow
D)session hijacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
worm that uses UDP port 8998 to contact the attacker's server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
type of DoS attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ or rootkits are computer programs that give attackers a means of regaining access to the attacked computer later.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ is defined as securing a stand-alone computer that's not part of a network infrastructure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
2005 hybrid worm with backdoor capabilities spread by mass e-mailing and exploiting Windows vulnerabilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____ enables an attacker to join a TCP session and make both parties think he or she is the other party.

A)A DoS attack
B)The Ping of Death
C)A buffer overflow attack
D)Session hijacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
most infamous macro virus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
purported to have shut down more than 13,000 ATMs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
Match each term with the correct statement below.
a.shell
f.Melissa
b.W32/Sobig.F
g.Back Orifice
c.Luckysploit
h.Slammer
d.Ping of Death
i.Mytob
e.KeyGhost
attack side of a sophisticated cybercrime toolkit that spreads when Web surfers visit a hacked Web site hosting the malware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Why is "attach" a key word when talking about viruses?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is Back Orifice?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How does a buffer overflow attack work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe an example of a macro virus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Some security professionals use fear tactics to scare users into complying with security measures. Is this a good tactic?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is spyware?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the most important recommendation that should be made to a client to help prevent viruses from being introduced into corporate networks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What types of ports do successful Trojan programs commonly use?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is the difference between spyware and adware?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is a DDoS attack?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.