Chapter 01 Quiz (ITN260) - Introduction and Security Trends

studied byStudied by 39 people
5.0(2)
Get a hint
Hint

How did the Slammer worm infect computer systems?

1 / 26

flashcard set

Earn XP

Description and Tags

27 Terms

1

How did the Slammer worm infect computer systems?

It exploited a buffer-overflow vulnerability in computers running Microsoft SQL Server or SQL Server Desktop Engine.

New cards
2

Which attack is an example of an advanced persistent threat (APT) first reported by Google that also targeted Adobe, Yahoo!, Juniper Networks, Rackspace, Symantec, and several major U.S. financial and industrial firms?

Operation Aurora

New cards
3

Which statement applies to viruses?

They typically are highly visible once released.

New cards
4

What name was given to the advanced persistent threat (APT)-style spy network responsible for bugging the Dalai Lama's office?

GhostNet

New cards
5

Which Internet worm created infected systems that were part of what is known as a bot network (or botnet) and could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users?

Conficker (a.k.a Downadup worm)

New cards
6

Which Internet worm, released in 1988, is considered to be one of the first real Internet crime cases?

The Morris worm

New cards
7

Which term refers to an attack conducted against a site with software that is vulnerable to a specific exploit?

Target of opportunity attack

New cards
8

True zero-day vulnerabilities are used often and quickly because once used, they will be patched. (T/F)

False

New cards
9

Which attacks represent examples of state-sponsored malware?

Stuxnet, Duqu, and Flame

New cards
10

What was the primary lesson learned from the Slammer worm?

It drove home the point that the Internet could be adversely impacted in a matter of minutes.

New cards
11

Which brand-name attack group consists of Russian hackers who have brought major issues to Ukraine via numerous attacks over the past couple of years?

Sandworm

New cards
12

Because of malware's nefarious purpose, there is no criminal distinction between the writers of malware and those who release malware. (T/F)

False

New cards
13

Melissa is the best known of the early macro-type viruses that attach themselves to documents for programs that have limited macro programming capability. (T/F)

True

New cards
14

In the early days of computers, security was considered to be a binary condition in which your system was either secure or not secure. (T/F)

True

New cards
15

Into which threat category does information warfare fall?

highly structured

New cards
16

What target did the teenage hacker who went by the name "Jester" attack in March 1997?

He cut off telephone services to the FAA control tower as well as the emergency services at the Worcester Airport and the community of Rutland, Massachusetts.

New cards
17

What name was given to an intellectual property attack executed against oil, gas, and petrochemical companies in the United States?

Operation Night Dragon

New cards
18

Most current ransomware attacks use a hybrid encrypting scheme, locking the files on a victim's computer until a ransom is paid. (T/F)

True

New cards
19

Criminal activity on the Internet, at its most basic, is quite different from criminal activity in the physical world. (T/F)

False

New cards
20

When internal threat actors pursue their attacks, they have an additional step to take: the establishment of access to the system under attack. (T/F)

False

New cards
21

Which term describes a category of attacks that generally are conducted over short periods of time (lasting at most a few months), involve a relatively small number of individuals, have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders?

unstructured threat category

New cards
22

One of the hardest threats that security professionals will have to address is that of the insider. (T/F)

True

New cards
23

Which Internet criminal is famous for conducting his attacks using a number of different "tools" and techniques, including social engineering, sniffers, and cloned cellular telephones?

Kevin Mitnick

New cards
24

In many early cases of computer crime, the perpetrator of the crime intended to cause damage to the computer. (T/F)

False

New cards
25

How did the Code Red worm spread?

It made use of a buffer-overflow condition in Microsoft's IIS web servers that had been known for a month.

New cards
26

Today, the data stored and processed by computers is almost always more valuable than the hardware. (T/F)

True

New cards
27

Who is considered to be the ultimate insider, with his name being synonymous with the insider threat issue?

Edward Snowden

New cards

Explore top notes

note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 35 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 134 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard79 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard94 terms
studied byStudied by 36 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard82 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard26 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard26 terms
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard947 terms
studied byStudied by 64 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard70 terms
studied byStudied by 88 people
Updated ... ago
5.0 Stars(5)
flashcards Flashcard72 terms
studied byStudied by 49 people
Updated ... ago
4.7 Stars(3)