Deck 18: Computer and Network Security Threats

Full screen (f)
exit full mode
Question
A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked, performs some unwanted or harmful function.
Use Space or
up arrow
down arrow
to flip the card.
Question
A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.
Question
A worm is a program that can replicate itself and send copies from computer to computer across network connections.
Question
Of the three classes of intruders into computer systems and networks,the clandestine user is typically:

A)an insider to the organization
B)an outsider to the organization
C)either an insider or an outsider to the organization
D)none of the above
Question
Important objectives of computer security include:

A)confidentiality
B)integrity
C)availability
D)all of the above
Question
Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.
Question
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A)active attacks
B)passive attacks
C)administrative attacks
D)none of the above
Question
A backdoor is the same as a trapdoor.
Question
All parasitic malware is software that replicates.
Question
Most viruses carry out their work in a manner that is specific to a particular operating system.
Question
Security threats can be classified based on how a given attack provides a threat to a given objective.
Question
Which of the following is not an example of intrusion:

A)guessing and cracking passwords
B)running a packet sniffer on a workstation to capture user names and passwords
C)using an unattended,logged-in workstation without permission
D)all of the above are examples of intrusion
Question
The three key objectives of computer security are confidentiality, integrity,and availability.
Question
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
Question
An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
Question
A masquerader is a legitimate user who accesses data,programs,or resources for which such access is not authorized.
Question
Traffic analysis is an active attack.
Question
A macro virus is a larger and more self-contained than an ordinary virus.
Question
A stealth virus is explicitly designed to hide itself from detection by antivirus software.
Question
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as ___________.

A)interruption
B)interception
C)modification
D)all of the above
Question
A loss of __________ is the disruption of access to or use of information or an information system.
Question
Which of the following statements is generally true regarding the original class of email viruses?

A)it sends itself to selected names on the user's email mailing list
B)arrive in email attachments
C)usually do no local damage on the infected machine
D)all of the above
Question
The network vehicle used for worm propagation is ___________.

A)electronic mail facility
B)remote execution capability
C)remote login capability
D)all of the above
Question
__________ involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: replay, masquerade,modification of messages,and denial of service.
Question
An example of _________ is traffic analysis,in which an adversary is able to gain information from observing the pattern of traffic on a network, such as the amount of traffic between particular pairs of hosts on the network.
Question
__________ capture keystrokes on a compromised system.

A)Worms
B)Zombies
C)Keyloggers
D)All of the above
Question
__________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability,and confidentiality of information system resources.
Question
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the _________.

A)propagation phase
B)triggering phase
C)execution phase
D)none of the above
Question
__________ is preserving authorized restrictions on information access and disclosure,including means for protecting personal privacy and proprietary information.
Question
Which of the following statements regarding macro viruses is true?

A)a macro virus is platform independent
B)macro viruses infect documents,not executable portions of code
C)macro viruses are easily spread
D)all of the above
Question
_________ are in the nature of eavesdropping on,or monitoring of, transmissions.The goal of the attacker is to obtain information that is being transmitted.
Question
An example of __________ is an adversary gaining unauthorized access to sensitive data by overcoming the system's access control protections.
Question
The three concepts that form the CIA triad are: confidentiality,integrity,and ____________.
Question
A loss of _________ is the unauthorized modification or destruction of information.
Question
The primary mechanism used in implementing denial-of-service attacks is the:

A)worm
B)Trojan horse
C)bot
D)all of the above
Question
_________ refers to the altering or replacing of valid data or the introduction of false data into a file or database.
Question
A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

A)logic bomb
B)Trojan horse
C)virus
D)none of the above
Question
A worm that can attack a variety of OSs rather than a single OS such as Windows is ______________.

A)multiplatform
B)multi-exploit
C)polymorphic
D)metamorphic
Question
A virus can be attached to a program by _________.

A)prepending
B)postpending
C)embedding other than at the beginning or end
D)all of the above
Question
Which of the following is a type of scanning strategy?

A)hit list
B)topological
C)local subnet
D)all of the above
Question
A _________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.
Question
A _________ propagates itself and activates itself,whereas a bot is controlled from some central facility,at least initially.
Question
___________ refers to programs (e.g.,script,macro,or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
Question
A ___________ is a form of virus explicitly designed to hide itself from detection by antivirus software.
Question
Also known as a zombie or drone,a __________ is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the creator.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: Computer and Network Security Threats
1
A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked, performs some unwanted or harmful function.
False
2
A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.
True
3
A worm is a program that can replicate itself and send copies from computer to computer across network connections.
True
4
Of the three classes of intruders into computer systems and networks,the clandestine user is typically:

A)an insider to the organization
B)an outsider to the organization
C)either an insider or an outsider to the organization
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Important objectives of computer security include:

A)confidentiality
B)integrity
C)availability
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A)active attacks
B)passive attacks
C)administrative attacks
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A backdoor is the same as a trapdoor.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
All parasitic malware is software that replicates.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Most viruses carry out their work in a manner that is specific to a particular operating system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Security threats can be classified based on how a given attack provides a threat to a given objective.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is not an example of intrusion:

A)guessing and cracking passwords
B)running a packet sniffer on a workstation to capture user names and passwords
C)using an unattended,logged-in workstation without permission
D)all of the above are examples of intrusion
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The three key objectives of computer security are confidentiality, integrity,and availability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A masquerader is a legitimate user who accesses data,programs,or resources for which such access is not authorized.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Traffic analysis is an active attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
A macro virus is a larger and more self-contained than an ordinary virus.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A stealth virus is explicitly designed to hide itself from detection by antivirus software.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as ___________.

A)interruption
B)interception
C)modification
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A loss of __________ is the disruption of access to or use of information or an information system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following statements is generally true regarding the original class of email viruses?

A)it sends itself to selected names on the user's email mailing list
B)arrive in email attachments
C)usually do no local damage on the infected machine
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The network vehicle used for worm propagation is ___________.

A)electronic mail facility
B)remote execution capability
C)remote login capability
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
__________ involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: replay, masquerade,modification of messages,and denial of service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
An example of _________ is traffic analysis,in which an adversary is able to gain information from observing the pattern of traffic on a network, such as the amount of traffic between particular pairs of hosts on the network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
__________ capture keystrokes on a compromised system.

A)Worms
B)Zombies
C)Keyloggers
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability,and confidentiality of information system resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the _________.

A)propagation phase
B)triggering phase
C)execution phase
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ is preserving authorized restrictions on information access and disclosure,including means for protecting personal privacy and proprietary information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following statements regarding macro viruses is true?

A)a macro virus is platform independent
B)macro viruses infect documents,not executable portions of code
C)macro viruses are easily spread
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
_________ are in the nature of eavesdropping on,or monitoring of, transmissions.The goal of the attacker is to obtain information that is being transmitted.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
An example of __________ is an adversary gaining unauthorized access to sensitive data by overcoming the system's access control protections.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The three concepts that form the CIA triad are: confidentiality,integrity,and ____________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A loss of _________ is the unauthorized modification or destruction of information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The primary mechanism used in implementing denial-of-service attacks is the:

A)worm
B)Trojan horse
C)bot
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_________ refers to the altering or replacing of valid data or the introduction of false data into a file or database.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

A)logic bomb
B)Trojan horse
C)virus
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A worm that can attack a variety of OSs rather than a single OS such as Windows is ______________.

A)multiplatform
B)multi-exploit
C)polymorphic
D)metamorphic
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A virus can be attached to a program by _________.

A)prepending
B)postpending
C)embedding other than at the beginning or end
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is a type of scanning strategy?

A)hit list
B)topological
C)local subnet
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
A _________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A _________ propagates itself and activates itself,whereas a bot is controlled from some central facility,at least initially.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
___________ refers to programs (e.g.,script,macro,or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A ___________ is a form of virus explicitly designed to hide itself from detection by antivirus software.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Also known as a zombie or drone,a __________ is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the creator.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.