Chapter 01 Quiz (ITN260) - Introduction and Security Trends

5.0(2)
studied byStudied by 40 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards
How did the Slammer worm infect computer systems?
It exploited a buffer-overflow vulnerability in computers running Microsoft SQL Server or SQL Server Desktop Engine.
2
New cards
Which attack is an example of an advanced persistent threat (APT) first reported by Google that also targeted Adobe, Yahoo!, Juniper Networks, Rackspace, Symantec, and several major U.S. financial and industrial firms?
Operation Aurora
3
New cards
Which statement applies to viruses?
They typically are highly visible once released.
4
New cards
What name was given to the advanced persistent threat (APT)-style spy network responsible for bugging the Dalai Lama's office?
GhostNet
5
New cards
Which Internet worm created infected systems that were part of what is known as a bot network (or botnet) and could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users?
Conficker (a.k.a Downadup worm)
6
New cards
Which Internet worm, released in 1988, is considered to be one of the first real Internet crime cases?
The Morris worm
7
New cards
Which term refers to an attack conducted against a site with software that is vulnerable to a specific exploit?
Target of opportunity attack
8
New cards
True zero-day vulnerabilities are used often and quickly because once used, they will be patched. (T/F)
False
9
New cards
Which attacks represent examples of state-sponsored malware?
Stuxnet, Duqu, and Flame
10
New cards
What was the primary lesson learned from the Slammer worm?
It drove home the point that the Internet could be adversely impacted in a matter of minutes.
11
New cards
Which brand-name attack group consists of Russian hackers who have brought major issues to Ukraine via numerous attacks over the past couple of years?
Sandworm
12
New cards
Because of malware's nefarious purpose, there is no criminal distinction between the writers of malware and those who release malware. (T/F)
False
13
New cards
Melissa is the best known of the early macro-type viruses that attach themselves to documents for programs that have limited macro programming capability. (T/F)
True
14
New cards
In the early days of computers, security was considered to be a binary condition in which your system was either secure or not secure. (T/F)
True
15
New cards
Into which threat category does information warfare fall?
highly structured
16
New cards
What target did the teenage hacker who went by the name "Jester" attack in March 1997?
He cut off telephone services to the FAA control tower as well as the emergency services at the Worcester Airport and the community of Rutland, Massachusetts.
17
New cards
What name was given to an intellectual property attack executed against oil, gas, and petrochemical companies in the United States?
Operation Night Dragon
18
New cards
Most current ransomware attacks use a hybrid encrypting scheme, locking the files on a victim's computer until a ransom is paid. (T/F)
True
19
New cards
Criminal activity on the Internet, at its most basic, is quite different from criminal activity in the physical world. (T/F)
False
20
New cards
When internal threat actors pursue their attacks, they have an additional step to take: the establishment of access to the system under attack. (T/F)
False
21
New cards
Which term describes a category of attacks that generally are conducted over short periods of time (lasting at most a few months), involve a relatively small number of individuals, have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders?
unstructured threat category
22
New cards
One of the hardest threats that security professionals will have to address is that of the insider. (T/F)
True
23
New cards
Which Internet criminal is famous for conducting his attacks using a number of different "tools" and techniques, including social engineering, sniffers, and cloned cellular telephones?
Kevin Mitnick
24
New cards
In many early cases of computer crime, the perpetrator of the crime intended to cause damage to the computer. (T/F)
False
25
New cards
How did the Code Red worm spread?
It made use of a buffer-overflow condition in Microsoft's IIS web servers that had been known for a month.
26
New cards
Today, the data stored and processed by computers is almost always more valuable than the hardware. (T/F)
True
27
New cards
Who is considered to be the ultimate insider, with his name being synonymous with the insider threat issue?
Edward Snowden