Cybersecurity Fundamentals Midterm (Original by PenguinVocabulary)

0.0(0)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/146

flashcard set

Earn XP

Description and Tags

None of the cards are mine, please don't credit me. The cards belong to PenguinVocabulary (https://quizlet.com/335381953/cybersecurity-fundamentals-midterm-flash-cards/)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

147 Terms

1
New cards

The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand

True

2
New cards

The type of hacking that involves breaking into telephone systems is called sneaking

False

3
New cards

The technique for breaching a system's security by exploiting human nature rather than technology is war-driving

False

4
New cards

Malware is a generic term for software that has a malicious purpose

True

5
New cards

Software that lays dormant until some specific condition is met is a Trojan horse

False

6
New cards

Someone who breaks into a system legally to assess security deficiencies is a sneaker

True

7
New cards

Auditing is the process to determine if a user's credentials are authorized to access a network resource

False

8
New cards

Confidentiality, integrity, and availability are three pillars of the CIA triangle

True

9
New cards

The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans

False

10
New cards

The SANS Institute website is a vast repository of security-related documentation

True

11
New cards

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Denial of service

12
New cards

Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threats, including social engineering. Which of the following best defines social engineering

Using people skills to obtain proprietary information

13
New cards

Which type of hacking occurs when the attacker monitors an authenticated session between the client and the server and takes over that session

Session hijacking

14
New cards

Someone who finds a flaw in a system and reports that flaw to the vendor of the system is a

White hat hacker

15
New cards

Someone who gains access to a system and causes harm is a

Black hat hacker

16
New cards

A black hat hacker is also called a

Cracker

17
New cards

Someone who calls himself a hacker but lacks the expertise is a

Script kiddy

18
New cards

Someone who legally breaks into a system to assess security deficiencies is a

Black hat hacker

19
New cards

A(n) ______ is a basic security device that filters traffic and is a barrier between a network and the outside world or between a system and other systems

Firewall

20
New cards

A(n) hides the internal network's IP address and presents a single IP address to the outside world

Proxy server

21
New cards

Which one of these is NOT one the three pillars of security in the CIA triangle

Authentication

22
New cards

Which of these is the process to determine if the credentials given by a user or another system are authorized to access the network resource in question

Authentication

23
New cards

Which of these is a repository of security-related documentation and also sponsors a number of security research projects

SANS Institute

24
New cards

Which of these was the first computer incident-response team

Computer Emergency Response Team

25
New cards

Which of these is a repository for detailed information on virus outbreaks

F-Secure

26
New cards

The notation used to perform variable-length subnet asking for IP addresses is CIDR

True

27
New cards

The name you type into a browser's address bar, such as www.microsoft.com, is known as the IP locator

False

28
New cards

The IP command-line command to determine your computer's IP address, subnet mask, and default gateway is ping

False

29
New cards

The IP command-line command to determine the number of hops it takes to get from your computer to its destination is ping

False

30
New cards

No protocols operate at the physical layer of the OSI model

True

31
New cards

The session layer of the OSI model provides the mechanism to manage the dialogue between end-user application processes

True

32
New cards

The TCP protocol works at the network layer of the OSI model

False

33
New cards

MAC addresses are unique addresses for each NIC

True

34
New cards

The first four bytes of the MAC address identify the vendor

False

35
New cards

A host is a machine with data on it, to which you can connect

True

36
New cards

Unshielded twisted-pair cable capable with a specification of 100 MHz/100 Mbps is also called Category

5

37
New cards

Which device can connect many computers and sends packets out every port

Hub

38
New cards

Which device is used to boost a signal

Repeater

39
New cards

Which device can connect many computers and sends data only out of one port

Switch

40
New cards

Which device can relay packets from one network to another and is usually programmable

Router

41
New cards

Which TCP/IP protocol operates on port 53 and translates URLs into Web addresses

DNS

42
New cards

Which TCP/IP protocol operates on ports 20 and 21 and is used for transferring files between computers

FTP

43
New cards

Which TCP/IP protocol operates on port 80 and displays web pages

HTTP

44
New cards

Which TCP/IP protocol operates on port 25 and sends email

SMTP

45
New cards

A(n) __________ hides the internal network's IP address and presents a single IP address to the outside world

Proxy server

46
New cards

An IP address consists of four numbers, separated by dots. Each number is called a(n)

Octet

47
New cards

If an IP address has the number 192 in the first octet, it is a class _______ address

C

48
New cards

If an IP address has the number 191 in the first octet, it is a class ______ address

B

49
New cards

What is the binary equivalent of the decimal number 240

11110000

50
New cards

The IP utility used to test connectivity with a remote host is

Ping

51
New cards

"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock, then circulates rumors that inflate the stock's value, and then sells for a profit

True

52
New cards

When fraudulent sellers bid on the seller's items to drive up the price, it is called bid shielding

False

53
New cards

Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception

True

54
New cards

The process to induce you to provide personal information through a website is called cyberstalking

False

55
New cards

Experts consider Romania the country with the strictest cybercrime laws

True

56
New cards

Firefox is an example of a phishing site

False

57
New cards

One good practice in a chat room is not to use your real name

True

58
New cards

Someone who uses the Internet to harass, threaten, or intimidate another person is guilty of identity theft

False

59
New cards

One good rule that applies to online investing is "Never invest money that you cannot afford to lose."

True

60
New cards

First-party cookies are the less likely to violate user privacy than third party cookies

True

61
New cards

Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price?

Shill bidding

62
New cards

Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price?

Bid shielding

63
New cards

Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?

Bid siphoning

64
New cards

Which of the following is the process to try to induce someone to provide you with personal information?

Phishing

65
New cards

Which of the following involves using the Internet to harass, threaten, or intimidate another person?

Cyberstalking

66
New cards

A file on your computer that websites use to store information about you is a

Cookie

67
New cards

Which of the following is one way to protect yourself against identity theft?

Do not provide personal information to anyone if it is not absolutely necessary

68
New cards

Which country is described by experts as having the strictest cybercrime laws?

A)United States

B)Russia

C)France

D)None of the above

None of the above

69
New cards

Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

Harassment

70
New cards

Why should a cybercrime law be specific?

To prevent defendants from finding loopholes

71
New cards

_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception

Identity

72
New cards

The recommended Internet Explorer privacy setting is

Medium high

73
New cards

Firefox and Internet Explorer are examples of

Web browsers

74
New cards

When using a chat room, one way to protect yourself from online harassment is

Not to use your real name

75
New cards

One way to protect yourself on auction sites is

Use a separate credit card with a low limit

76
New cards

Blocking ICMP packets may help prevent denial-of-service attacks

True

77
New cards

A smurf attack is a type of malware attack

False

78
New cards

The ping -l option changes the size of the packet you can send

True

79
New cards

A denial-of-service attack is one of the most common attacks on a system

True

80
New cards

SYN cookies are a form of attack

False

81
New cards

Stack tweaking is a method to alter the TCP stack so that a timeout takes less time when a SYN connection is left incomplete

True

82
New cards

A teardrop attack involves sending a forged packet to the victim

False

83
New cards

An echo-chargen attack occurs when the attacker sends a forged packet with the same source IP address and destination IP address as the target's IP address

False

84
New cards

The group Anonymous is a supporter of Wikileaks founder Julian Assange and launched multiple distributed denial-of-service attacks on various financial companies

True

85
New cards

A firewall can be configured to disallow certain types of incoming traffic that may be attacking

True

86
New cards

Which type of attack attempts to overload the system with requests, denying legitimate users access?

Denial of service

87
New cards

Which defensive technique involves the server sending a wrong SYN+ACK to the client, so the client sends and RST packet notifying the server of an error? This makes the server think the client request is legitimate.

RST cookies

88
New cards

Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address, causing the network to perform a DoS attack on one of more of its member servers?

Smurf IP attack

89
New cards

Which defensive technique involves altering the TCP stack on the server so that it will take less time to timeout when a SYN connection is left incomplete?

Stack tweaking

90
New cards

Micro blocks, SYN cookies, RST cookies, and stack tweaking are defenses against ______

TCP SYN flood attacks

91
New cards

The command-line command _______ 127.0.0.1 -l 65000 -w 0 -t will send multiple large packets to a computer, and when initiated by multiple senders may cause a denial-of-service attack

A)dos

B)ddos

C)tfn

D)None of the above

None of the above

92
New cards

One tool used for a denial-of-service attack is

Tribal Flood Network

93
New cards

The command-line command to display all options for the ping command is ping ____.

A)-h

B)-i

C) -j

D)none of the above

none of the above

94
New cards

The command-line command to instruct the ping utility to send packets until explicitly told to stop is ping

-t

95
New cards

The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself is a(n) _______________ attack

Land

96
New cards

The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack.

Teardrop

97
New cards

The attack in which the attacker sends a packet that is too large and can shut down a target machine is a(n) ________________ attack.

Ping of Death

98
New cards

One defense against denial-of-service attacks is to _______ ICMP packets

Block

99
New cards

One classic denial-of-service attack distributed by email was

myDoom

100
New cards

The most common way for a virus to spread is by reading your email address book and emailing itself to your contacts

True