Security+ Chapter 1 example #25937

26 March 2023
4.8 (163 reviews)
35 test answers

Unlock all answers in this set

Unlock answers (31)
question
What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988? - The Code Red Worm - The Morris Worm - The Slammer Worm - The Jester Worm
answer
The Morris Worm
question
Why is the Morris worm significant? - It placed embarrassing text on people's screens. - This was the first large-scale attack on the Internet. - It was the very first virus on the Internet. - It attacked the Windows operating system.
answer
This was the first large-scale attack on the Internet.
question
What is the most common threat to information security in an organization? - Computer viruses - Power surges - Forgotten passwords - SPAM
answer
Computer viruses
question
The term "script kiddies" refers to - A hacker of low-end technical ability - A children's television show - A type of video game - An Internet site for peer-to-peer music sharing
answer
A hacker of low-end technical ability
question
What is an unstructured threat? - An elite hacker who mounts an attack against a specific target - A poorly engineered building - A type of malicious code that formats the hard drive on a computer. - An attack that is uncoordinated, nonspecific, and lasts a short amount of time
answer
An attack that is uncoordinated, nonspecific, and lasts a short amount of time
question
What is a structured threat? - An attack that uses coordination, insiders, and lasts for a long period of time - A type of malicious code that formats the hard drive on a computer - An attempt to weaken infrastructure - An official threat from a terrorist organization
answer
An attack that uses coordination, insiders, and lasts for a long period of time
question
Information warfare is - A video game - Warfare conducted against information and information processing equipment - A type of malicious code that "declares war" on a network by formatting the hard drives on computers and copying itself to other computers - A weapon that uses microwaves to destroy enemy vehicles
answer
Warfare conducted against information and information processing equipment
question
The term "hacktivist" refers to - A hacker who works for the government - A hacker with low technical ability - A hacker who is motivated by a political agenda - A hacker who can write scripts
answer
A hacker who is motivated by a political agenda
question
What is a port scan? - Identifies what ports can be used to smuggle information across borders - Identifies ports that are open and services that are running - Identifies the USB, parallel, and serial ports that can be used to connect to the system - Identifies the IP addresses of computers on the network
answer
Identifies ports that are open and services that are running
question
A ping sweep - Is a method of clearing your network - Sends ICMP echo requests to the target machine - Determines what services are running on a system - Is an exploit that creates a denial of service (DoS) using ICMP echo requests
answer
Sends ICMP echo requests to the target machine
question
Who is Kevin Mitnick? - He used social engineering, sniffers, and cloned cell phones to gain unauthorized access to networks belonging to Motorola, Novell, Fujitsu, and Sun Microsystems. - He made bank transfers from St. Petersburg using the Citibank cash management system. - He gained access to a loop carrier system operated by NYNEX and cut off FAA control tower and emergency services. - He developed the "Love Bug" love-letter virus that spread to 45 million people
answer
He used social engineering, sniffers, and cloned cell phones to gain unauthorized access to networks belonging to Motorola, Novell, Fujitsu, and Sun Microsystems.
question
What is Solar Sunrise? - An attack that was made to look like an attack from Iraq, but was actually made by two teenagers from California who got training in Israel - Electronic interference resulting from solar flares, occurring most commonly in the early morning hours. - A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructure - The name of a virus that would "burn up" your hard drive at 6 A.M on the day of the summer solstice
answer
An attack that was made to look like an attack from Iraq, but was actually made by two teenagers from California who got training in Israel
question
What was the Slammer Worm/Virus? - It was a macro virus that spread by emailing the first 50 people in the victim's address book with the subject: Important message. - The first Internet worm that "slammed" the Internet, created by a graduate student at Cornell University in 1988. - Malware that exploited Microsoft SQL Server and spread across the world in just 10 minutes. - Malware that would "slam" shut your computer by not allowing you to log in.
answer
Malware that exploited Microsoft SQL Server and spread across the world in just 10 minutes.
question
What is an elite hacker? - A hacker with a high level of technical ability - A hacker who has a wealthy background, and who is politically motivated - A hacker who has elitist ideas and hacks for political purposes - A hacker who searches for scripts and ready-made tools to use for attacks
answer
A hacker with a high level of technical ability
question
If the system is infected with a time bomb, it means that - It has a virus that will do physical damage to the computer. - It has equipment that is coming close to the end of its life cycle. - It has a piece of malicious code that will be triggered at a certain time. - It has a piece of malicious code that will be triggered by a certain user activity
answer
It has a piece of malicious code that will be triggered at a certain time.
question
A successful attack on a network may adversely impact security in all the following ways EXCEPT: - Loss of confidentiality - Loss of integrity - Loss of functionality - Loss of availability
answer
Loss of functionality
question
When information is modified by individuals not authorized to change it you have suffered a - Loss of confidentiality - Loss of integrity - Loss of functionality - Loss of availability
answer
Loss of integrity
question
When information is disclosed to individuals not authorized to see it, you have suffered a - Loss of confidentiality - Loss of integrity - Loss of functionality - Loss of availability
answer
Loss of confidentiality
question
As the level of sophistication of attacks has increased, - The level of knowledge necessary to exploit vulnerabilities has increased - The level of knowledge necessary to exploit vulnerabilities has decreased - The level of skill necessary to exploit vulnerabilities has increased - The amount of exploit software available on the Internet has decreased
answer
The level of knowledge necessary to exploit vulnerabilities has decreased
question
According to the Computer Crime and Security Survey, the four types of attacks that increased from 2007 to 2008 were - Viruses, insider abuse, laptop theft, and unauthorized access - Unauthorized access, theft/loss of proprietary information, misuse of web applications, and DNS attacks - Viruses, insider abuse, misuse of web applications, and DNS attacks - Laptop theft, unauthorized access, and theft/loss of proprietary information
answer
Unauthorized access, theft/loss of proprietary information, misuse of web applications, and DNS attacks
question
In April 2009, Homeland Security Secretary Janet Napolitano told reporters - Organized crime made attempts to break into the US electric power grid - Hacktivists made attempts to break into the US electric power grid - Terrorists made attempts to break into the US electric power grid - China and Russia made attempts to break into the US electric power grid
answer
China and Russia made attempts to break into the US electric power grid
question
The first step an administrator can take to reduce possible attacks is to - Ensure all patches for the operating system and applications are installed - Install a firewall - Install anti-spyware software - Configure an intrusion detection system
answer
Ensure all patches for the operating system and applications are installed
question
The message "Hacked by Chinese," was left by the - Melissa virus - Love Letter virus - Slammer Worm - Code Red Worm
answer
Code Red Worm
question
When users are unable to access information or the systems processing information, you may have suffered a - Loss of confidentiality - Loss of integrity - Loss of authentication - Loss of availability
answer
Loss of availability
question
Each of the infected systems became part of what is known as a bot network, which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users, as a result of the - Slammer Worm - Morris Worm - Conficker - Melissa Worm
answer
Conficker
question
Fifty years ago, few people had access to a computer system or network, so securing them was a relatively easy matter. True or False
answer
True
question
The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small, tightly contained mainframes to a highly widespread network of much larger systems. True or False
answer
False
question
The steps an attacker takes in attempting to penetrate a targeted network are extremely different from the ones that a security consultant performing a penetration test would take. True or False
answer
False
question
The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed. True or False
answer
True
question
There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker, it is a target of opportunity, or it is a target that was specified to be attacked by a larger criminal organization. True or False
answer
False
question
One significant trend observed over the last several years has been the decrease in the number of computer attacks by nonaffiliated intruders as opposed to attacks by organized hacking groups, criminal organizations, or nations. True or False
answer
False
question
There are a number of different threats to security, including viruses and worms, intruders, insiders, criminal organizations, terrorists, and information warfare conducted by foreign countries. True or False
answer
True
question
Viruses have no useful purpose. True or False
answer
True
question
The Code Red Worm spread to 350,000 computers in just over a week. True or False
answer
False
question
One of the hardest threats that the security professional will have to deal with is the elite hacker. True or False
answer
False