1/140
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Cyberterrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.
true
The Beijing Eagle Union consists of Chinese hackers.
false
The MyDoom virus was directed against the Pentagon.
false
The Stuxnet virus was directed against Iraqi nuclear facilities.
false
Information warfare is any attempt to manipulate information in pursuit of a military or political goal.
true
Radio Free Europe was supported by Western democracies during the Cold War.
true
Usenet and Yahoo! are examples of email services.
false
One technique of disinformation is to produce false or skewed news stories.
true
Hactivists means individuals who work for a cause using hacking techniques.
true
The U.S. Patriot Act specifically deals with cyberterrorism.
true
___________ is the premeditated, politically motivated attack against information computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
Cyberterrorism
In May 2007, government offices of _________ were subjected to a mass denial-of-service attack because some people opposed the government’s removal of a Russian WWII memorial.
estonia
One example of Chinese hackers whose stated goal is to infiltrate Western computer systems is a group called the ___________.
China Eagle Union
A(n) ________attack on data can include stealing or destroying data.
Economic
The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems.
Stuxnet
Any attempt to manipulate information in pursuit of a military or political goal is ________.
Information warfare
The ________ War was the first modern war in which there was strong and widespread domestic opposition.
vietnam
During the ___________ War, Western democracies invested time and money for radio broadcasts into communist nations.
cold
A propaganda agent can manage multiple online personalities, posting to many different _____________.
Bulletin boards and discussion groups
In 1996 a hacker allegedly associated with the white supremacist movement temporarily disabled a ___________ ISP.
Massachusetts
In 1998, ethnic Tami guerrillas swamped _________ embassies with 800 emails a day.
Sri Lankan
Although the Cyberterrorism Preparedness Act of 2002 was not passed, many of its goals were addressed by the ___________.
Patriot Act
The joint task force representing components of all four U.S armed services is the ____________.
U.S. Cyber Command
Microsoft Baseline Security Analyzer (MBSA) checks one or more Windows machines to see if they have basic security in place.
true
Nessus is the premiere network vulnerability scanner.
true
Experience is the most important factor when looking for a security professional.
true
CNE, MCITP, CISSP, and CCNA are examples of industry certifications.
true
Every open port on a router is a possible avenue of entry for a malware or intruder.
true
For individual computers not running firewall software, you should directly close ports.
false
Windows has a built in firewall, but Linux does not.
false
There should be a firewall between your network and the outside world.
true
A good password should contain only letters and numbers.
false
A good rule of thumb for a password history policy is a history depth of five.
true
The first rule of computer security is to check ___________.
patches
Any _________ you do not explicitly need should be shut down.
ports
For an individual machine that is not running firewall software, you do not directly close ports. You shut down the _________ using that port.
None of the above
A password policy for a 90- or 180-day replacement schedule is called password
age
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password. This is particularly important if your password policy has a history depth of five.
Minimum password age
A good password has at least ______ characters.
8
Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.
once
The process to make a system as secure as it can be without adding on specialized software or equipment is _______________
Hardening
On a server, you should create your own accounts with ________ that reflect their level of permission.
names
A _________ involves setting up two firewalls: an outer and an inner firewall.
DMZ (demilitarized zone)
The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.
routers
A security policy is a document that defines how an organization deals with some aspect of security.
true
Passwords are an area of user policies.
true
A good password should have at least eight characters and use all lowercase letters.
false
An organization should not permit end users to install anything on their computer.
true
After an employee discontinues employment, his or her workstation hard drive should be searched.
true
Principal of least privilege means that no one person can perform critical tasks.
false
One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings.
true
You cannot disable some USB devices from end-user computers and allow others
false
Standards are specific instructions on how to handle a specific issue.
false
Security policies toward programmers and web developers are developmental policies.
true
A document that defines how an organization deals with some aspect of security is a(n) __________.
Security policy
Password guidelines, Internet use, how to handle email attachments, and software installation processes are areas of ______.
User policies
The plan to return a business to full normal operations is ____________
DRP
__________ is the most obvious reason for organizations to provide their users with Internet access.
Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?
Online shopping during a break time
Which of the following should NOT be a part of an organization’s policy regarding email attachments?
None of the above
Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______
Instant messaging
The background, screensaver, font size, and resolution are elements of _______.
Desktop configuration
Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies.
System administration
New employees should receive a copy of the company’s __________ policies.
Security/acceptable use
When an employee leaves, all _______ should be terminated.
Logins
If you determine a virus has struck a system, the first step is to _________.
Unplug the machines from the network
If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated.
IP address
The conflict between the users’ goal for unfettered access to data and the security administrator’s goal to protect that data is an issue of ______________.
Access control
The principal that users have access to only network resources when an administrator explicitly grants them is called ___________.
Implicit deny
The category of intrusion detection systems that looks for patterns that don’t match those of normal use is called anomaly detection.
true
Snort is an open-source firewall.
false
A server with fake data used to attract an attacker is a honeypot.
true
When an administrator proactively seeks out intelligence on potential threats or groups, this is called infiltration.
true
The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.
false
An on-demand virus scanner runs in the background and is constantly checking your PC.
false
Heuristic scanning uses rules to determine whether a file or program behaves like a virus.
true
Linux and Windows typically are not shipped with firewalls.
false
A screening firewall works in the application layer of the OSI model.
false
A stateful packet inspection firewall examines each packet, and denies or permits access based not only on the current packet, but also on data derived from previous packets in the conversation.
true
A list of virus definitions is generally in a file with a ________ extension.
.dat
Typically, when you update virus definitions _____________.
Your computer restarts.
A file that stays in memory after it executes is a(n) _____________.
Terminate and Stay Resident program
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
Heuristic
The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is ________.
sandbox
Java and ActiveX codes should be scanned before they are _________.
Downloaded to your computer
Mistaking a legitimate program for a virus is a ____________.
False positive
A _________ is a barrier between your network and the outside world.
Firewall
A packet-filtering firewall is a(n) ____________ firewall.
Packet Filtering
A(n)___________ firewall examines the entire conversation between client and server, not just individual packets.
Stateful Packet Inspection
In which firewall configuration is the software installed on an existing machine with an existing operating system?
Network host-based
In which firewall configuration is the firewall running on a server with at least two network interfaces?
Dual-homed host
A firewall ______ is a tool that can provide information after an incident has occurred.
log
A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.
True
IPsec can only encrypt the packet data but not the header information.
False
L2TP uses IPsec for its encryption.
True
Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user’s machine.
True
A digital signature is used to guarantee who sent a message. This is referred to as non-repudiation.
True
Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.
True
PGP involves only private key encryption.
False
The most widely used symmetric key algorithm is Advanced Encryption Standard.
True