Deck 1: Introduction and Security Trends

Full screen (f)
exit full mode
Question
What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988?

A)The Code Red Worm
B)The Morris Worm
C)The Slammer Worm
D)The Jester Worm
Use Space or
up arrow
down arrow
to flip the card.
Question
Why is the Morris worm significant?

A)It placed embarrassing text on people's screens.
B)This was the first large-scale attack on the Internet.
C)It was the very first virus on the Internet.
D)It attacked the Windows operating system.
Question
When information is disclosed to individuals not authorized to see it,you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
Question
Information warfare is

A)A video game
B)Warfare conducted against information and information processing equipment
C)A type of malicious code that "declares war" on a network by formatting the hard drives on computers and copying itself to other computers
D)A weapon that uses microwaves to destroy enemy vehicles
Question
Who is Kevin Mitnick?

A)He used social engineering,sniffers,and cloned cell phones to gain unauthorized access to networks belonging to Motorola,Novell,Fujitsu,and Sun Microsystems.
B)He made bank transfers from St.Petersburg using the Citibank cash management system.
C)He gained access to a loop carrier system operated by NYNEX and cut off FAA control tower and emergency services.
D)He developed the "Love Bug" love-letter virus that spread to 45 million people.
Question
What is an unstructured threat?

A)An elite hacker who mounts an attack against a specific target
B)A poorly engineered building
C)A type of malicious code that formats the hard drive on a computer.
D)An attack that is uncoordinated,nonspecific,and lasts a short amount of time
Question
A successful attack on a network may adversely impact security in all the following ways EXCEPT:

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability While the loss of functionality may also result,the main target of attacks from a security perspective will be against the confidentiality,integrity,and availability of information.Oddly enough,a loss of functionality may increase the security of the network.
Question
If the system is infected with a time bomb,it means that

A)It has a virus that will do physical damage to the computer.
B)It has equipment that is coming close to the end of its life cycle.
C)It has a piece of malicious code that will be triggered at a certain time.
D)It has a piece of malicious code that will be triggered by a certain user activity.
Question
A ping sweep

A)Is a method of clearing your network
B)Sends ICMP echo requests to the target machine
C)Determines what services are running on a system
D)Is an exploit that creates a denial of service (DoS)using ICMP echo requests
Question
What is the most common threat to information security in an organization?

A)Computer viruses
B)Power surges
C)Forgotten passwords
D)SPAM
Question
What is an elite hacker?

A)A hacker with a high level of technical ability
B)A hacker who has a wealthy background,and who is politically motivated
C)A hacker who has elitist ideas and hacks for political purposes
D)A hacker who searches for scripts and ready-made tools to use for attacks
Question
According to the Computer Crime and Security Survey,the four types of attacks that increased from 2007 to 2008 were

A)Viruses,insider abuse,laptop theft,and unauthorized access
B)Unauthorized access,theft/loss of proprietary information,misuse of web applications,and DNS attacks
C)Viruses,insider abuse,misuse of web applications,and DNS attacks
D)Laptop theft,unauthorized access,and theft/loss of proprietary information
Question
What is a structured threat?

A)An attack that uses coordination,insiders,and lasts for a long period of time
B)A type of malicious code that formats the hard drive on a computer
C)An attempt to weaken infrastructure
D)An official threat from a terrorist organization
Question
As the level of sophistication of attacks has increased,

A)The level of knowledge necessary to exploit vulnerabilities has increased
B)The level of knowledge necessary to exploit vulnerabilities has decreased
C)The level of skill necessary to exploit vulnerabilities has increased
D)The amount of exploit software available on the Internet has decreased
Question
What is a port scan?

A)Identifies what ports can be used to smuggle information across borders
B)Identifies ports that are open and services that are running
C)Identifies the USB,parallel,and serial ports that can be used to connect to the system
D)Identifies the IP addresses of computers on the network
Question
When information is modified by individuals not authorized to change it you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
Question
The term "script kiddies" refers to

A)A hacker of low-end technical ability
B)A children's television show
C)A type of video game
D)An Internet site for peer-to-peer music sharing
Question
In April 2009,Homeland Security Secretary Janet Napolitano told reporters

A)Organized crime made attempts to break into the US electric power grid
B)Hacktivists made attempts to break into the US electric power grid
C)Terrorists made attempts to break into the US electric power grid
D)China and Russia made attempts to break into the US electric power grid
Question
The term "hacktivist" refers to

A)A hacker who works for the government
B)A hacker with low technical ability
C)A hacker who is motivated by a political agenda
D)A hacker who can write scripts
Question
What was the Slammer Worm/Virus?

A)It was a macro virus that spread by emailing the first 50 people in the victim's address book with the subject: Important message.
B)The first Internet worm that "slammed" the Internet,created by a graduate student at Cornell University in 1988.
C)Malware that exploited Microsoft SQL Server and spread across the world in just 10 minutes.
D)Malware that would "slam" shut your computer by not allowing you to log in.
Question
The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small,tightly contained mainframes to a highly widespread network of much larger systems.
Question
There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker,it is a target of opportunity,or it is a target that was specified to be attacked by a larger criminal organization.
Question
The first step an administrator can take to reduce possible attacks is to

A)Ensure all patches for the operating system and applications are installed
B)Install a firewall
C)Install anti-spyware software
D)Configure an intrusion detection system
Question
There are a number of different threats to security,including viruses and worms,intruders,insiders,criminal organizations,terrorists,and information warfare conducted by foreign countries.
Question
Each of the infected systems became part of what is known as a bot network,which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users,as a result of the

A)Slammer Worm
B)Morris Worm
C)Conficker
D)Melissa Worm
Question
Viruses have no useful purpose.
Question
As the level of sophistication of attacks _________,the level of knowledge necessary to exploit vulnerabilities decreased.
Question
The Code Red Worm spread to 350,000 computers in just over a week.
It took just 14 hours.
Question
The steps an attacker takes in attempting to penetrate a targeted network are extremely different from the ones that a security consultant performing a penetration test would take.
Question
One significant trend observed over the last several years has been the decrease in the number of computer attacks by nonaffiliated intruders as opposed to attacks by organized hacking groups,criminal organizations,or nations.
Question
Vladimir Levin was able to steal $10 Million from _______________ by using its cash management system.
Question
In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.
Question
The message "Hacked by Chinese," was left by the

A)Melissa virus
B)Love Letter virus
C)Slammer Worm
D)Code Red Worm
Question
The first worm to attack the Internet was the _______________.
Question
One of the hardest threats that the security professional will have to deal with is the elite hacker.
The insider threat is the hardest one to deal with.They already have access to the organization and its assets.
Question
The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed.
Question
_______________ are people who attack networks with a political purpose in mind.
Question
Fifty years ago,few people had access to a computer system or network,so securing them was a relatively easy matter.
Question
Hackers who are able to discover new vulnerabilities and write code to exploit them are known as _______________.
Question
When users are unable to access information or the systems processing information,you may have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of authentication
D)Loss of availability
Question
Explain the steps in minimizing possible avenues of attack.
Question
The two general reasons a particular computer system is attacked: either it is specifically targeted by the attacker,or it is a(n)_______________.
Question
What are the three types of losses that can result from an attack on information?
Question
Briefly explain the steps in an attack.
Question
Choose 3 security incidents from the last 20 or so years and state the significance of the incident.
Question
_______________ are hackers who do not have enough technical skill to discovery vulnerabilities on their own,and cannot write their own scripts to exploit vulnerabilities.
Question
What are the three different types of hackers and what are their technical abilities?
Question
A hacker will run a(n)_______________ in order to determine what services are running on the target machine.
Question
The second step an administrator can take in minimizing possible avenues of attack is _______________.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction and Security Trends
1
What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988?

A)The Code Red Worm
B)The Morris Worm
C)The Slammer Worm
D)The Jester Worm
B
2
Why is the Morris worm significant?

A)It placed embarrassing text on people's screens.
B)This was the first large-scale attack on the Internet.
C)It was the very first virus on the Internet.
D)It attacked the Windows operating system.
B
3
When information is disclosed to individuals not authorized to see it,you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
A
4
Information warfare is

A)A video game
B)Warfare conducted against information and information processing equipment
C)A type of malicious code that "declares war" on a network by formatting the hard drives on computers and copying itself to other computers
D)A weapon that uses microwaves to destroy enemy vehicles
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
Who is Kevin Mitnick?

A)He used social engineering,sniffers,and cloned cell phones to gain unauthorized access to networks belonging to Motorola,Novell,Fujitsu,and Sun Microsystems.
B)He made bank transfers from St.Petersburg using the Citibank cash management system.
C)He gained access to a loop carrier system operated by NYNEX and cut off FAA control tower and emergency services.
D)He developed the "Love Bug" love-letter virus that spread to 45 million people.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
What is an unstructured threat?

A)An elite hacker who mounts an attack against a specific target
B)A poorly engineered building
C)A type of malicious code that formats the hard drive on a computer.
D)An attack that is uncoordinated,nonspecific,and lasts a short amount of time
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
A successful attack on a network may adversely impact security in all the following ways EXCEPT:

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability While the loss of functionality may also result,the main target of attacks from a security perspective will be against the confidentiality,integrity,and availability of information.Oddly enough,a loss of functionality may increase the security of the network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
If the system is infected with a time bomb,it means that

A)It has a virus that will do physical damage to the computer.
B)It has equipment that is coming close to the end of its life cycle.
C)It has a piece of malicious code that will be triggered at a certain time.
D)It has a piece of malicious code that will be triggered by a certain user activity.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
A ping sweep

A)Is a method of clearing your network
B)Sends ICMP echo requests to the target machine
C)Determines what services are running on a system
D)Is an exploit that creates a denial of service (DoS)using ICMP echo requests
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
What is the most common threat to information security in an organization?

A)Computer viruses
B)Power surges
C)Forgotten passwords
D)SPAM
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
What is an elite hacker?

A)A hacker with a high level of technical ability
B)A hacker who has a wealthy background,and who is politically motivated
C)A hacker who has elitist ideas and hacks for political purposes
D)A hacker who searches for scripts and ready-made tools to use for attacks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
According to the Computer Crime and Security Survey,the four types of attacks that increased from 2007 to 2008 were

A)Viruses,insider abuse,laptop theft,and unauthorized access
B)Unauthorized access,theft/loss of proprietary information,misuse of web applications,and DNS attacks
C)Viruses,insider abuse,misuse of web applications,and DNS attacks
D)Laptop theft,unauthorized access,and theft/loss of proprietary information
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
What is a structured threat?

A)An attack that uses coordination,insiders,and lasts for a long period of time
B)A type of malicious code that formats the hard drive on a computer
C)An attempt to weaken infrastructure
D)An official threat from a terrorist organization
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
As the level of sophistication of attacks has increased,

A)The level of knowledge necessary to exploit vulnerabilities has increased
B)The level of knowledge necessary to exploit vulnerabilities has decreased
C)The level of skill necessary to exploit vulnerabilities has increased
D)The amount of exploit software available on the Internet has decreased
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
What is a port scan?

A)Identifies what ports can be used to smuggle information across borders
B)Identifies ports that are open and services that are running
C)Identifies the USB,parallel,and serial ports that can be used to connect to the system
D)Identifies the IP addresses of computers on the network
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
When information is modified by individuals not authorized to change it you have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of functionality
D)Loss of availability
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
The term "script kiddies" refers to

A)A hacker of low-end technical ability
B)A children's television show
C)A type of video game
D)An Internet site for peer-to-peer music sharing
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
In April 2009,Homeland Security Secretary Janet Napolitano told reporters

A)Organized crime made attempts to break into the US electric power grid
B)Hacktivists made attempts to break into the US electric power grid
C)Terrorists made attempts to break into the US electric power grid
D)China and Russia made attempts to break into the US electric power grid
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
The term "hacktivist" refers to

A)A hacker who works for the government
B)A hacker with low technical ability
C)A hacker who is motivated by a political agenda
D)A hacker who can write scripts
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
What was the Slammer Worm/Virus?

A)It was a macro virus that spread by emailing the first 50 people in the victim's address book with the subject: Important message.
B)The first Internet worm that "slammed" the Internet,created by a graduate student at Cornell University in 1988.
C)Malware that exploited Microsoft SQL Server and spread across the world in just 10 minutes.
D)Malware that would "slam" shut your computer by not allowing you to log in.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small,tightly contained mainframes to a highly widespread network of much larger systems.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker,it is a target of opportunity,or it is a target that was specified to be attacked by a larger criminal organization.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
The first step an administrator can take to reduce possible attacks is to

A)Ensure all patches for the operating system and applications are installed
B)Install a firewall
C)Install anti-spyware software
D)Configure an intrusion detection system
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
There are a number of different threats to security,including viruses and worms,intruders,insiders,criminal organizations,terrorists,and information warfare conducted by foreign countries.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
Each of the infected systems became part of what is known as a bot network,which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users,as a result of the

A)Slammer Worm
B)Morris Worm
C)Conficker
D)Melissa Worm
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
Viruses have no useful purpose.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
As the level of sophistication of attacks _________,the level of knowledge necessary to exploit vulnerabilities decreased.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
The Code Red Worm spread to 350,000 computers in just over a week.
It took just 14 hours.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
The steps an attacker takes in attempting to penetrate a targeted network are extremely different from the ones that a security consultant performing a penetration test would take.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
One significant trend observed over the last several years has been the decrease in the number of computer attacks by nonaffiliated intruders as opposed to attacks by organized hacking groups,criminal organizations,or nations.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Vladimir Levin was able to steal $10 Million from _______________ by using its cash management system.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
The message "Hacked by Chinese," was left by the

A)Melissa virus
B)Love Letter virus
C)Slammer Worm
D)Code Red Worm
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
The first worm to attack the Internet was the _______________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
One of the hardest threats that the security professional will have to deal with is the elite hacker.
The insider threat is the hardest one to deal with.They already have access to the organization and its assets.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
_______________ are people who attack networks with a political purpose in mind.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
Fifty years ago,few people had access to a computer system or network,so securing them was a relatively easy matter.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
Hackers who are able to discover new vulnerabilities and write code to exploit them are known as _______________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
When users are unable to access information or the systems processing information,you may have suffered a

A)Loss of confidentiality
B)Loss of integrity
C)Loss of authentication
D)Loss of availability
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
Explain the steps in minimizing possible avenues of attack.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
The two general reasons a particular computer system is attacked: either it is specifically targeted by the attacker,or it is a(n)_______________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
What are the three types of losses that can result from an attack on information?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
Briefly explain the steps in an attack.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
Choose 3 security incidents from the last 20 or so years and state the significance of the incident.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
_______________ are hackers who do not have enough technical skill to discovery vulnerabilities on their own,and cannot write their own scripts to exploit vulnerabilities.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
What are the three different types of hackers and what are their technical abilities?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
A hacker will run a(n)_______________ in order to determine what services are running on the target machine.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
The second step an administrator can take in minimizing possible avenues of attack is _______________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 49 flashcards in this deck.