cybersecurity 2nd half

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/140

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

141 Terms

1
New cards

Cyberterrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.

true

2
New cards

The Beijing Eagle Union consists of Chinese hackers.

false

3
New cards

The MyDoom virus was directed against the Pentagon.

false

4
New cards

The Stuxnet virus was directed against Iraqi nuclear facilities.

false

5
New cards

Information warfare is any attempt to manipulate information in pursuit of a military or political goal.

true

6
New cards

Radio Free Europe was supported by Western democracies during the Cold War.

true

7
New cards

Usenet and Yahoo! are examples of email services.

false

8
New cards

One technique of disinformation is to produce false or skewed news stories.

true

9
New cards

Hactivists means individuals who work for a cause using hacking techniques.

true

10
New cards

The U.S. Patriot Act specifically deals with cyberterrorism.

true

11
New cards

___________ is the premeditated, politically motivated attack against information computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

Cyberterrorism

12
New cards

In May 2007, government offices of _________ were subjected to a mass denial-of-service attack because some people opposed the government’s removal of a Russian WWII memorial.

estonia

13
New cards

One example of Chinese hackers whose stated goal is to infiltrate Western computer systems is a group called the ___________.

China Eagle Union

14
New cards

A(n) ________attack on data can include stealing or destroying data.

Economic

15
New cards

The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems.

Stuxnet

16
New cards

Any attempt to manipulate information in pursuit of a military or political goal is ________.

Information warfare

17
New cards

The ________ War was the first modern war in which there was strong and widespread domestic opposition.

vietnam

18
New cards

During the ___________ War, Western democracies invested time and money for radio broadcasts into communist nations.

cold

19
New cards

A propaganda agent can manage multiple online personalities, posting to many different _____________.

Bulletin boards and discussion groups

20
New cards

In 1996 a hacker allegedly associated with the white supremacist movement temporarily disabled a ___________ ISP.

Massachusetts

21
New cards

In 1998, ethnic Tami guerrillas swamped _________ embassies with 800 emails a day.

Sri Lankan

22
New cards

Although the Cyberterrorism Preparedness Act of 2002 was not passed, many of its goals were addressed by the ___________.

Patriot Act

23
New cards

The joint task force representing components of all four U.S armed services is the ____________.

U.S. Cyber Command

24
New cards

Microsoft Baseline Security Analyzer (MBSA) checks one or more Windows machines to see if they have basic security in place.

true

25
New cards

Nessus is the premiere network vulnerability scanner.

true

26
New cards

Experience is the most important factor when looking for a security professional.

true

27
New cards

CNE, MCITP, CISSP, and CCNA are examples of industry certifications.

true

28
New cards

Every open port on a router is a possible avenue of entry for a malware or intruder.

true

29
New cards

For individual computers not running firewall software, you should directly close ports.

false

30
New cards

Windows has a built in firewall, but Linux does not.

false

31
New cards

There should be a firewall between your network and the outside world.

true

32
New cards

A good password should contain only letters and numbers.

false

33
New cards

A good rule of thumb for a password history policy is a history depth of five.

true

34
New cards

The first rule of computer security is to check ___________.

patches

35
New cards

Any _________ you do not explicitly need should be shut down.

ports

36
New cards

For an individual machine that is not running firewall software, you do not directly close ports. You shut down the _________ using that port.

None of the above

37
New cards

A password policy for a 90- or 180-day replacement schedule is called password

age

38
New cards

You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password. This is particularly important if your password policy has a history depth of five.

Minimum password age

39
New cards

A good password has at least ______ characters.

8

40
New cards

Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.

once

41
New cards

The process to make a system as secure as it can be without adding on specialized software or equipment is _______________

Hardening

42
New cards

On a server, you should create your own accounts with ________ that reflect their level of permission.

names

43
New cards

A _________ involves setting up two firewalls: an outer and an inner firewall.

DMZ (demilitarized zone)

44
New cards

The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.

routers

45
New cards

A security policy is a document that defines how an organization deals with some aspect of security.

true

46
New cards

Passwords are an area of user policies.

true

47
New cards

A good password should have at least eight characters and use all lowercase letters.

false

48
New cards

An organization should not permit end users to install anything on their computer.

true

49
New cards

After an employee discontinues employment, his or her workstation hard drive should be searched.

true

50
New cards

Principal of least privilege means that no one person can perform critical tasks.

false

51
New cards

One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings.

true

52
New cards

You cannot disable some USB devices from end-user computers and allow others

false

53
New cards

Standards are specific instructions on how to handle a specific issue.

false

54
New cards

Security policies toward programmers and web developers are developmental policies.

true

55
New cards

A document that defines how an organization deals with some aspect of security is a(n) __________.

Security policy

56
New cards

Password guidelines, Internet use, how to handle email attachments, and software installation processes are areas of ______.

User policies

57
New cards

The plan to return a business to full normal operations is ____________

DRP

58
New cards

__________ is the most obvious reason for organizations to provide their users with Internet access.

Email

59
New cards

Which of the following is an activity that falls into a gray area and might be acceptable Internet use in some organizations but not others?

Online shopping during a break time

60
New cards

Which of the following should NOT be a part of an organization’s policy regarding email attachments?

None of the above

61
New cards

Use for business communications only and the disallowing of the transmission of confidential business information are recommended guidelines for _______

Instant messaging

62
New cards

The background, screensaver, font size, and resolution are elements of _______.

Desktop configuration

63
New cards

Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies.

System administration

64
New cards

New employees should receive a copy of the company’s __________ policies.

Security/acceptable use

65
New cards

When an employee leaves, all _______ should be terminated.

Logins

66
New cards

If you determine a virus has struck a system, the first step is to _________.

Unplug the machines from the network

67
New cards

If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated.

IP address

68
New cards

The conflict between the users’ goal for unfettered access to data and the security administrator’s goal to protect that data is an issue of ______________.

Access control

69
New cards

The principal that users have access to only network resources when an administrator explicitly grants them is called ___________.

Implicit deny

70
New cards

The category of intrusion detection systems that looks for patterns that don’t match those of normal use is called anomaly detection.

true

71
New cards

Snort is an open-source firewall.

false

72
New cards

A server with fake data used to attract an attacker is a honeypot.

true

73
New cards

When an administrator proactively seeks out intelligence on potential threats or groups, this is called infiltration.

true

74
New cards

The method to attract an intruder to a subsystem setup for the purpose of observing him is called intrusion deterrence.

false

75
New cards

An on-demand virus scanner runs in the background and is constantly checking your PC.

false

76
New cards

Heuristic scanning uses rules to determine whether a file or program behaves like a virus.

true

77
New cards

Linux and Windows typically are not shipped with firewalls.

false

78
New cards

A screening firewall works in the application layer of the OSI model.

false

79
New cards

A stateful packet inspection firewall examines each packet, and denies or permits access based not only on the current packet, but also on data derived from previous packets in the conversation.

true

80
New cards

A list of virus definitions is generally in a file with a ________ extension.

.dat

81
New cards

Typically, when you update virus definitions _____________.

Your computer restarts.

82
New cards

A file that stays in memory after it executes is a(n) _____________.

Terminate and Stay Resident program

83
New cards

The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.

Heuristic

84
New cards

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is ________.

sandbox

85
New cards

Java and ActiveX codes should be scanned before they are _________.

Downloaded to your computer

86
New cards

Mistaking a legitimate program for a virus is a ____________.

False positive

87
New cards

A _________ is a barrier between your network and the outside world.

Firewall

88
New cards

A packet-filtering firewall is a(n)  ____________ firewall.

Packet Filtering

89
New cards

A(n)___________ firewall examines the entire conversation between client and server, not just individual packets.

Stateful Packet Inspection

90
New cards

In which firewall configuration is the software installed on an existing machine with an existing operating system?

Network host-based

91
New cards

In which firewall configuration is the firewall running on a server with at least two network interfaces?

Dual-homed host

92
New cards

A firewall ______ is a tool that can provide information after an incident has occurred.

log

93
New cards

A virtual private network is a way to use the Internet to create a connection between a remote user and a central location.

True

94
New cards

IPsec can only encrypt the packet data but not the header information.

False

95
New cards

L2TP uses IPsec for its encryption.

True

96
New cards

Kerberos is an authentication protocol that uses a ticket granting system that sends an encrypted ticket to the user’s machine.

True

97
New cards

A digital signature is used to guarantee who sent a message. This is referred to as non-repudiation.

True

98
New cards

Public key encryption is fast becoming the most widely used type of encryption because there are no issues to deal with concerning distribution of keys.

True

99
New cards

PGP involves only private key encryption.

False

100
New cards

The most widely used symmetric key algorithm is Advanced Encryption Standard.

True