Deck 7: Procedures for Responding to Attacks on Computers

Full screen (f)
exit full mode
Question
The FBI defines Cyberterrorism as a violent act that intimidates a government and its citizens.
Use Space or
up arrow
down arrow
to flip the card.
Question
Application-layer attacks often use ports that are allowed through a firewall.
Question
The CERT Coordination Center provides professional information and security awareness services to defense contractors, governments, and industrial security executives.
Question
RAID also uses a technique called parity to determine whether data has been lost or over-written.
Question
Managing external threats is much easier than managing the risks from inside the organization.
Question
Threats, such as industrial espionage or a malicious act toward a senior staff member, are deliberate .
Question
Securing a system against intrusion is an immense and difficult task.
Question
The most expensive code attack was the Code Red virus at $8.75 billion.
Question
The explosive growth of networks and Internet connections gives attackers almost limitless opportunities to probe until they find a network with a security flaw they can exploit.
Question
Theft of proprietary information was the source of the most serious financial loss in companies surveyed.
Question
Small systems consist of file servers, applications servers, workstation servers, Web servers, and mainframes.
Question
In the information warfare model, victims are classified as individuals, corporations, or countries .
Question
If an organization detects and confirms a breach in system security, its next step should be to collect as much information as it can about the intrusion.
Question
Until recently, the Organization for Cooperation and Development has been at the forefront of addressing privacy issues .
Question
When people or groups use computer technology, software, and networks to attack systems, they launch a malicious code attack .
Question
The striping technique saves data simultaneously to separate hard drives or drive arrays.
Question
Most disasters result from natural causes.
Question
Most organizations have insurance that covers damage produced by major privacy violations.
Question
Securing systems against direct or indirect attack requires dividing internal and external threats into cohesive and manageable elements early in the business analysis.
Question
An internal threat would originate from any employee who has physical access to equipment and legitimate rights to information within the organization.
Question
The ____ Web site provides data on the hidden cost of downtime from a variety of articles, research reports, and consulting firms.

A)Downtime Central
B)Creative Data Concepts Ltd.
C)Computer Security Products Inc.
D)SANS Institute
Question
The ____ Web site provides information on the cost of downtime.

A)SANS Institute
B)Alternative Power Systems
C)Network Security Center
D)Downtime Central
Question
The ____ Web site provides information that can serve as an introduction to disaster recovery planning.

A)Alternative Power Systems
B)Computer Security Products Inc.
C)DHS
D)FEMA
Question
Which of the following are all important parts of comprehensive IT security policies and procedures?

A)Access controls
B)Physical security of sensitive systems
C)System audits
D)All of the above
Question
____ attacks focus on making a service unavailable for normal use, typically by exhausting some resource within a network, operating system, or application.

A)Application-layer
B)Denial-of-service (DoS)
C)TCP SYN flood
D)IP-spoofing
Question
Which legislation requires financial institutions to disclose their privacy policies to customers?

A)The Gramm-Leach-Bliley Act of 1999
B)Children's Online Privacy Protection Act of 1998
C)Telecommunications Act of 1996
D)Privacy Act of 1974
Question
What type of threat could originate from any employee who has physical access to equipment and legitimate rights to information within the organization?

A)Internal
B)External
C)Direct
D)Indirect
E)a, c, and d
Question
____ attacks can occur during the client-server "handshake", a sequence of messages required when a client attempts to establish a TCP connection to a server.

A)Denial-of-service (DoS)
B)Ping of death
C)TCP SYN flood
D)Stacheldraht
Question
In the Computer Crime and Security Survey 2002, what was the most frequent point of attack?

A)Denial-of-service
B)Inappropriate e-mail
C)Internet connections
D)Internal attacks
Question
Which legislation requires Web site operators and online service providers to obtain parental consent to collect a child's personal information, and requires sites that collect information from children to disclose how they plan to use the data?

A)The Homeland Security Act of 2002
B)Children's Online Privacy Protection Act of 1998
C)The Electronic Communications Privacy Act of 1986
D)Privacy Act of 1974
Question
Which act authorizes sharing of the federal government information-gathering efforts with relevant foreign, state, and local officials?

A)The Electronic Communications Privacy Act of 1986
B)The USA PATRIOT Act of 2001
C)The Gramm-Leach-Bliley Act of 1999
D)The Homeland Security Act of 2002
Question
Which legislation limits the use and disclosure of customer proprietary network information (CPNI)by telecommunications service providers?

A)Electronic Communications Privacy Act of 1986
B)Communications Policy Act of 1984
C)Telecommunications Act of 1996
D)Video Privacy Protection Act of 1988
Question
____ attacks occur when a hacker inside or outside a network pretends to be a trusted computer.

A)Ping of death
B)IP-spoofing
C)Man-in-the-middle
D)Trojan horse
Question
____ are programs that allow intruders to scan hundreds of thousands of systems quite quickly.

A)Application-layer attack
B)Autorooters
C)TCP SYN flood
D)Packet sniffers
Question
Which act was implemented to protect the privacy of people identified in information systems maintained by federal executive branch agencies, and to control the collection, use, and sharing of information?

A)Privacy Act of 1974
B)Telecommunications Act of 1996
C)The Gramm-Leach-Bliley Act of 1999
D)The Electronic Communications Privacy Act of 1986
Question
With ____ attacks, an intruder takes control of many systems to launch an attack.

A)application-layer
B)TCP SYN flood
C)denial-of-service
D)IP-spoofing
Question
In the information warfare model, which of the following is a classification of victim?

A)Personal
B)Country
C)Business
D)Individual
Question
____ combines features of several DoS attacks, including TFN.

A)Man-in-the-middle
B)Stacheldraht
C)Trojan horse
D)Trust exploitation
Question
The ____ Web site provides information for protecting computer systems and handling computer security incidents.

A)FEMA
B)NSA
C)CERT Coordination Center
D)FBI
Question
The ____ Web site provides training and useful resources.

A)Cisco Systems Inc.
B)Microsoft Corporation
C)SANS Institute
D)FEMA
Question
One popular model for categorizing threats separates information warfare into three categories. What are they?
Question
____ attacks are repeated attempts to identify a user account and password.

A)Backdoors
B)Trust exploitation
C)Password attacks
D)Trojan horse
Question
What type of negative economic impact from computer attacks might include damage to systems, the direct costs of repairing or replacing systems, and disrupted business and revenues?

A)Immediate
B)Mid-term
C)Short-term
D)Long-term
Question
What steps can organizations take to cooperate with the DHS cyberspace strategy? (List 5)
Question
____ attacks refer to malicious software that is attached to another program to execute an unwanted function on a user workstation.

A)Trojan horse
B)Backdoors
C)IP-spoofing
D)Application-layer
Question
What should organizations consider when developing procedures to deal with information warfare threats and damages? (List all 5)
Question
How many FBI field offices have established an InfraGard chapter?

A)52
B)54
C)56
D)58
Question
To protect against cyberattacks and create an appropriate defense plan, organizations need a combination of what 4 things?
Question
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does B represent?</strong> A)Dial-up modem B)ISDN C)Frame relay D)ATM <div style=padding-top: 35px> " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does B represent?

A)Dial-up modem
B)ISDN
C)Frame relay
D)ATM
Question
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does F represent?</strong> A)Frame relay B)T-3 C)SONET D)ATM <div style=padding-top: 35px> " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does F represent?

A)Frame relay
B)T-3
C)SONET
D)ATM
Question
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does H represent?</strong> A)T-1 B)Frame relay C)Wireless LAN bridge D)VPN <div style=padding-top: 35px> " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does H represent?

A)T-1
B)Frame relay
C)Wireless LAN bridge
D)VPN
Question
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does E represent?</strong> A)T-1 B)T-3 C)ATM D)Frame relay <div style=padding-top: 35px> " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does E represent?

A)T-1
B)T-3
C)ATM
D)Frame relay
Question
The national InfraGard program provides what 4 basic services to members?
Question
What type of negative economic impact from computer attacks might include lost contracts, sales, or customers, a tarnished reputation, and problems in developing new business?

A)Immediate
B)Short-term
C)Long-term
D)Mid-term
Question
Which of the following are procedures to follow after a computer attack?

A)Prepare for law enforcement to enter the facility
B)Review system logs for clues about the attackers point of entry
C)Recommend security upgrades or changes
D)All of the above
Question
____ are software applications that use a network adapter card in "promiscuous" mode.

A)Trojan horses
B)Application-layer attacks
C)Autorooters
D)Packet sniffers
Question
____ are a type of trust exploitation attack that uses a compromised host to pass traffic through a firewall that would otherwise be dropped.

A)Password
B)IP-spoofing
C)Man-in-the-middle
D)Port redirection
Question
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets document calls for cooperation among government, industry ,and private citizens to protect which key assets? (List 5)
Question
What type of negative economic impact from computer attacks might include reduced market valuation, stock prices, investor confidence, and goodwill toward the organization?

A)Immediate
B)Short-term
C)Mid-term
D)Long-term
Question
____ attacks can occur when a hacker has access to packets that come across a network.

A)Trojan horse
B)Man-in-the-middle
C)Port redirection
D)Trust exploitation
Question
List each of the systems and networks in an organization that require recovery.
Question
Match between columns
Lost system functionality and effectiveness
Stacheldraht
Lost system functionality and effectiveness
Loss of availability
Lost system functionality and effectiveness
Trust exploitation attack
Lost system functionality and effectiveness
Ping of death
Lost system functionality and effectiveness
Information warfare
Lost system functionality and effectiveness
Malicious code attack
Lost system functionality and effectiveness
Autorooters
Lost system functionality and effectiveness
Terrorist incident
Lost system functionality and effectiveness
Network reconnaissance
Lost system functionality and effectiveness
Virus
An organized effort to use cyberattacks to disrupt computer systems
Stacheldraht
An organized effort to use cyberattacks to disrupt computer systems
Loss of availability
An organized effort to use cyberattacks to disrupt computer systems
Trust exploitation attack
An organized effort to use cyberattacks to disrupt computer systems
Ping of death
An organized effort to use cyberattacks to disrupt computer systems
Information warfare
An organized effort to use cyberattacks to disrupt computer systems
Malicious code attack
An organized effort to use cyberattacks to disrupt computer systems
Autorooters
An organized effort to use cyberattacks to disrupt computer systems
Terrorist incident
An organized effort to use cyberattacks to disrupt computer systems
Network reconnaissance
An organized effort to use cyberattacks to disrupt computer systems
Virus
Computer code that is meant to damage or disrupt computer systems
Stacheldraht
Computer code that is meant to damage or disrupt computer systems
Loss of availability
Computer code that is meant to damage or disrupt computer systems
Trust exploitation attack
Computer code that is meant to damage or disrupt computer systems
Ping of death
Computer code that is meant to damage or disrupt computer systems
Information warfare
Computer code that is meant to damage or disrupt computer systems
Malicious code attack
Computer code that is meant to damage or disrupt computer systems
Autorooters
Computer code that is meant to damage or disrupt computer systems
Terrorist incident
Computer code that is meant to damage or disrupt computer systems
Network reconnaissance
Computer code that is meant to damage or disrupt computer systems
Virus
A hacker takes advantage of a trust relationship within a network
Stacheldraht
A hacker takes advantage of a trust relationship within a network
Loss of availability
A hacker takes advantage of a trust relationship within a network
Trust exploitation attack
A hacker takes advantage of a trust relationship within a network
Ping of death
A hacker takes advantage of a trust relationship within a network
Information warfare
A hacker takes advantage of a trust relationship within a network
Malicious code attack
A hacker takes advantage of a trust relationship within a network
Autorooters
A hacker takes advantage of a trust relationship within a network
Terrorist incident
A hacker takes advantage of a trust relationship within a network
Network reconnaissance
A hacker takes advantage of a trust relationship within a network
Virus
A violent act that endangers human life
Stacheldraht
A violent act that endangers human life
Loss of availability
A violent act that endangers human life
Trust exploitation attack
A violent act that endangers human life
Ping of death
A violent act that endangers human life
Information warfare
A violent act that endangers human life
Malicious code attack
A violent act that endangers human life
Autorooters
A violent act that endangers human life
Terrorist incident
A violent act that endangers human life
Network reconnaissance
A violent act that endangers human life
Virus
Programs that automate the entire hacking process
Stacheldraht
Programs that automate the entire hacking process
Loss of availability
Programs that automate the entire hacking process
Trust exploitation attack
Programs that automate the entire hacking process
Ping of death
Programs that automate the entire hacking process
Information warfare
Programs that automate the entire hacking process
Malicious code attack
Programs that automate the entire hacking process
Autorooters
Programs that automate the entire hacking process
Terrorist incident
Programs that automate the entire hacking process
Network reconnaissance
Programs that automate the entire hacking process
Virus
Malicious software that is attached to another program
Stacheldraht
Malicious software that is attached to another program
Loss of availability
Malicious software that is attached to another program
Trust exploitation attack
Malicious software that is attached to another program
Ping of death
Malicious software that is attached to another program
Information warfare
Malicious software that is attached to another program
Malicious code attack
Malicious software that is attached to another program
Autorooters
Malicious software that is attached to another program
Terrorist incident
Malicious software that is attached to another program
Network reconnaissance
Malicious software that is attached to another program
Virus
An attack that combines features of several DoS attacks
Stacheldraht
An attack that combines features of several DoS attacks
Loss of availability
An attack that combines features of several DoS attacks
Trust exploitation attack
An attack that combines features of several DoS attacks
Ping of death
An attack that combines features of several DoS attacks
Information warfare
An attack that combines features of several DoS attacks
Malicious code attack
An attack that combines features of several DoS attacks
Autorooters
An attack that combines features of several DoS attacks
Terrorist incident
An attack that combines features of several DoS attacks
Network reconnaissance
An attack that combines features of several DoS attacks
Virus
Gathering of information about a target network using publicly available data
Stacheldraht
Gathering of information about a target network using publicly available data
Loss of availability
Gathering of information about a target network using publicly available data
Trust exploitation attack
Gathering of information about a target network using publicly available data
Ping of death
Gathering of information about a target network using publicly available data
Information warfare
Gathering of information about a target network using publicly available data
Malicious code attack
Gathering of information about a target network using publicly available data
Autorooters
Gathering of information about a target network using publicly available data
Terrorist incident
Gathering of information about a target network using publicly available data
Network reconnaissance
Gathering of information about a target network using publicly available data
Virus
Attacks that send oversized IP packets to a computer system
Stacheldraht
Attacks that send oversized IP packets to a computer system
Loss of availability
Attacks that send oversized IP packets to a computer system
Trust exploitation attack
Attacks that send oversized IP packets to a computer system
Ping of death
Attacks that send oversized IP packets to a computer system
Information warfare
Attacks that send oversized IP packets to a computer system
Malicious code attack
Attacks that send oversized IP packets to a computer system
Autorooters
Attacks that send oversized IP packets to a computer system
Terrorist incident
Attacks that send oversized IP packets to a computer system
Network reconnaissance
Attacks that send oversized IP packets to a computer system
Virus
Question
The adverse impact of a hacking attack or intrusion can also be described in terms of what three types of losses?
Question
List and describe the negative economic effects an organization could endure as a result of computer attacks or intrusions.
Question
What should organizations do to help recover small systems after a computer attack?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/65
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Procedures for Responding to Attacks on Computers
1
The FBI defines Cyberterrorism as a violent act that intimidates a government and its citizens.
False
2
Application-layer attacks often use ports that are allowed through a firewall.
True
3
The CERT Coordination Center provides professional information and security awareness services to defense contractors, governments, and industrial security executives.
False
4
RAID also uses a technique called parity to determine whether data has been lost or over-written.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
5
Managing external threats is much easier than managing the risks from inside the organization.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
6
Threats, such as industrial espionage or a malicious act toward a senior staff member, are deliberate .
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
7
Securing a system against intrusion is an immense and difficult task.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
8
The most expensive code attack was the Code Red virus at $8.75 billion.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
9
The explosive growth of networks and Internet connections gives attackers almost limitless opportunities to probe until they find a network with a security flaw they can exploit.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
10
Theft of proprietary information was the source of the most serious financial loss in companies surveyed.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
11
Small systems consist of file servers, applications servers, workstation servers, Web servers, and mainframes.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
12
In the information warfare model, victims are classified as individuals, corporations, or countries .
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
13
If an organization detects and confirms a breach in system security, its next step should be to collect as much information as it can about the intrusion.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
14
Until recently, the Organization for Cooperation and Development has been at the forefront of addressing privacy issues .
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
15
When people or groups use computer technology, software, and networks to attack systems, they launch a malicious code attack .
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
16
The striping technique saves data simultaneously to separate hard drives or drive arrays.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
17
Most disasters result from natural causes.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
18
Most organizations have insurance that covers damage produced by major privacy violations.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
19
Securing systems against direct or indirect attack requires dividing internal and external threats into cohesive and manageable elements early in the business analysis.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
20
An internal threat would originate from any employee who has physical access to equipment and legitimate rights to information within the organization.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
21
The ____ Web site provides data on the hidden cost of downtime from a variety of articles, research reports, and consulting firms.

A)Downtime Central
B)Creative Data Concepts Ltd.
C)Computer Security Products Inc.
D)SANS Institute
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
22
The ____ Web site provides information on the cost of downtime.

A)SANS Institute
B)Alternative Power Systems
C)Network Security Center
D)Downtime Central
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
23
The ____ Web site provides information that can serve as an introduction to disaster recovery planning.

A)Alternative Power Systems
B)Computer Security Products Inc.
C)DHS
D)FEMA
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following are all important parts of comprehensive IT security policies and procedures?

A)Access controls
B)Physical security of sensitive systems
C)System audits
D)All of the above
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
25
____ attacks focus on making a service unavailable for normal use, typically by exhausting some resource within a network, operating system, or application.

A)Application-layer
B)Denial-of-service (DoS)
C)TCP SYN flood
D)IP-spoofing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
26
Which legislation requires financial institutions to disclose their privacy policies to customers?

A)The Gramm-Leach-Bliley Act of 1999
B)Children's Online Privacy Protection Act of 1998
C)Telecommunications Act of 1996
D)Privacy Act of 1974
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
27
What type of threat could originate from any employee who has physical access to equipment and legitimate rights to information within the organization?

A)Internal
B)External
C)Direct
D)Indirect
E)a, c, and d
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
28
____ attacks can occur during the client-server "handshake", a sequence of messages required when a client attempts to establish a TCP connection to a server.

A)Denial-of-service (DoS)
B)Ping of death
C)TCP SYN flood
D)Stacheldraht
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
29
In the Computer Crime and Security Survey 2002, what was the most frequent point of attack?

A)Denial-of-service
B)Inappropriate e-mail
C)Internet connections
D)Internal attacks
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
30
Which legislation requires Web site operators and online service providers to obtain parental consent to collect a child's personal information, and requires sites that collect information from children to disclose how they plan to use the data?

A)The Homeland Security Act of 2002
B)Children's Online Privacy Protection Act of 1998
C)The Electronic Communications Privacy Act of 1986
D)Privacy Act of 1974
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
31
Which act authorizes sharing of the federal government information-gathering efforts with relevant foreign, state, and local officials?

A)The Electronic Communications Privacy Act of 1986
B)The USA PATRIOT Act of 2001
C)The Gramm-Leach-Bliley Act of 1999
D)The Homeland Security Act of 2002
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
32
Which legislation limits the use and disclosure of customer proprietary network information (CPNI)by telecommunications service providers?

A)Electronic Communications Privacy Act of 1986
B)Communications Policy Act of 1984
C)Telecommunications Act of 1996
D)Video Privacy Protection Act of 1988
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
33
____ attacks occur when a hacker inside or outside a network pretends to be a trusted computer.

A)Ping of death
B)IP-spoofing
C)Man-in-the-middle
D)Trojan horse
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
34
____ are programs that allow intruders to scan hundreds of thousands of systems quite quickly.

A)Application-layer attack
B)Autorooters
C)TCP SYN flood
D)Packet sniffers
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
35
Which act was implemented to protect the privacy of people identified in information systems maintained by federal executive branch agencies, and to control the collection, use, and sharing of information?

A)Privacy Act of 1974
B)Telecommunications Act of 1996
C)The Gramm-Leach-Bliley Act of 1999
D)The Electronic Communications Privacy Act of 1986
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
36
With ____ attacks, an intruder takes control of many systems to launch an attack.

A)application-layer
B)TCP SYN flood
C)denial-of-service
D)IP-spoofing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
37
In the information warfare model, which of the following is a classification of victim?

A)Personal
B)Country
C)Business
D)Individual
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
38
____ combines features of several DoS attacks, including TFN.

A)Man-in-the-middle
B)Stacheldraht
C)Trojan horse
D)Trust exploitation
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ Web site provides information for protecting computer systems and handling computer security incidents.

A)FEMA
B)NSA
C)CERT Coordination Center
D)FBI
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ Web site provides training and useful resources.

A)Cisco Systems Inc.
B)Microsoft Corporation
C)SANS Institute
D)FEMA
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
41
One popular model for categorizing threats separates information warfare into three categories. What are they?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
42
____ attacks are repeated attempts to identify a user account and password.

A)Backdoors
B)Trust exploitation
C)Password attacks
D)Trojan horse
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
43
What type of negative economic impact from computer attacks might include damage to systems, the direct costs of repairing or replacing systems, and disrupted business and revenues?

A)Immediate
B)Mid-term
C)Short-term
D)Long-term
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
44
What steps can organizations take to cooperate with the DHS cyberspace strategy? (List 5)
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
45
____ attacks refer to malicious software that is attached to another program to execute an unwanted function on a user workstation.

A)Trojan horse
B)Backdoors
C)IP-spoofing
D)Application-layer
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
46
What should organizations consider when developing procedures to deal with information warfare threats and damages? (List all 5)
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
47
How many FBI field offices have established an InfraGard chapter?

A)52
B)54
C)56
D)58
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
48
To protect against cyberattacks and create an appropriate defense plan, organizations need a combination of what 4 things?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
49
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does B represent?</strong> A)Dial-up modem B)ISDN C)Frame relay D)ATM " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does B represent?

A)Dial-up modem
B)ISDN
C)Frame relay
D)ATM
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
50
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does F represent?</strong> A)Frame relay B)T-3 C)SONET D)ATM " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does F represent?

A)Frame relay
B)T-3
C)SONET
D)ATM
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
51
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does H represent?</strong> A)T-1 B)Frame relay C)Wireless LAN bridge D)VPN " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does H represent?

A)T-1
B)Frame relay
C)Wireless LAN bridge
D)VPN
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
52
<strong>   style=vertical-align: 0px; width=468px height=358px In the table above, what does E represent?</strong> A)T-1 B)T-3 C)ATM D)Frame relay " style="vertical-align: 0px;" width="468px" height="358px In the table above, what does E represent?

A)T-1
B)T-3
C)ATM
D)Frame relay
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
53
The national InfraGard program provides what 4 basic services to members?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
54
What type of negative economic impact from computer attacks might include lost contracts, sales, or customers, a tarnished reputation, and problems in developing new business?

A)Immediate
B)Short-term
C)Long-term
D)Mid-term
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following are procedures to follow after a computer attack?

A)Prepare for law enforcement to enter the facility
B)Review system logs for clues about the attackers point of entry
C)Recommend security upgrades or changes
D)All of the above
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
56
____ are software applications that use a network adapter card in "promiscuous" mode.

A)Trojan horses
B)Application-layer attacks
C)Autorooters
D)Packet sniffers
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
57
____ are a type of trust exploitation attack that uses a compromised host to pass traffic through a firewall that would otherwise be dropped.

A)Password
B)IP-spoofing
C)Man-in-the-middle
D)Port redirection
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
58
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets document calls for cooperation among government, industry ,and private citizens to protect which key assets? (List 5)
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
59
What type of negative economic impact from computer attacks might include reduced market valuation, stock prices, investor confidence, and goodwill toward the organization?

A)Immediate
B)Short-term
C)Mid-term
D)Long-term
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
60
____ attacks can occur when a hacker has access to packets that come across a network.

A)Trojan horse
B)Man-in-the-middle
C)Port redirection
D)Trust exploitation
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
61
List each of the systems and networks in an organization that require recovery.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Lost system functionality and effectiveness
Stacheldraht
Lost system functionality and effectiveness
Loss of availability
Lost system functionality and effectiveness
Trust exploitation attack
Lost system functionality and effectiveness
Ping of death
Lost system functionality and effectiveness
Information warfare
Lost system functionality and effectiveness
Malicious code attack
Lost system functionality and effectiveness
Autorooters
Lost system functionality and effectiveness
Terrorist incident
Lost system functionality and effectiveness
Network reconnaissance
Lost system functionality and effectiveness
Virus
An organized effort to use cyberattacks to disrupt computer systems
Stacheldraht
An organized effort to use cyberattacks to disrupt computer systems
Loss of availability
An organized effort to use cyberattacks to disrupt computer systems
Trust exploitation attack
An organized effort to use cyberattacks to disrupt computer systems
Ping of death
An organized effort to use cyberattacks to disrupt computer systems
Information warfare
An organized effort to use cyberattacks to disrupt computer systems
Malicious code attack
An organized effort to use cyberattacks to disrupt computer systems
Autorooters
An organized effort to use cyberattacks to disrupt computer systems
Terrorist incident
An organized effort to use cyberattacks to disrupt computer systems
Network reconnaissance
An organized effort to use cyberattacks to disrupt computer systems
Virus
Computer code that is meant to damage or disrupt computer systems
Stacheldraht
Computer code that is meant to damage or disrupt computer systems
Loss of availability
Computer code that is meant to damage or disrupt computer systems
Trust exploitation attack
Computer code that is meant to damage or disrupt computer systems
Ping of death
Computer code that is meant to damage or disrupt computer systems
Information warfare
Computer code that is meant to damage or disrupt computer systems
Malicious code attack
Computer code that is meant to damage or disrupt computer systems
Autorooters
Computer code that is meant to damage or disrupt computer systems
Terrorist incident
Computer code that is meant to damage or disrupt computer systems
Network reconnaissance
Computer code that is meant to damage or disrupt computer systems
Virus
A hacker takes advantage of a trust relationship within a network
Stacheldraht
A hacker takes advantage of a trust relationship within a network
Loss of availability
A hacker takes advantage of a trust relationship within a network
Trust exploitation attack
A hacker takes advantage of a trust relationship within a network
Ping of death
A hacker takes advantage of a trust relationship within a network
Information warfare
A hacker takes advantage of a trust relationship within a network
Malicious code attack
A hacker takes advantage of a trust relationship within a network
Autorooters
A hacker takes advantage of a trust relationship within a network
Terrorist incident
A hacker takes advantage of a trust relationship within a network
Network reconnaissance
A hacker takes advantage of a trust relationship within a network
Virus
A violent act that endangers human life
Stacheldraht
A violent act that endangers human life
Loss of availability
A violent act that endangers human life
Trust exploitation attack
A violent act that endangers human life
Ping of death
A violent act that endangers human life
Information warfare
A violent act that endangers human life
Malicious code attack
A violent act that endangers human life
Autorooters
A violent act that endangers human life
Terrorist incident
A violent act that endangers human life
Network reconnaissance
A violent act that endangers human life
Virus
Programs that automate the entire hacking process
Stacheldraht
Programs that automate the entire hacking process
Loss of availability
Programs that automate the entire hacking process
Trust exploitation attack
Programs that automate the entire hacking process
Ping of death
Programs that automate the entire hacking process
Information warfare
Programs that automate the entire hacking process
Malicious code attack
Programs that automate the entire hacking process
Autorooters
Programs that automate the entire hacking process
Terrorist incident
Programs that automate the entire hacking process
Network reconnaissance
Programs that automate the entire hacking process
Virus
Malicious software that is attached to another program
Stacheldraht
Malicious software that is attached to another program
Loss of availability
Malicious software that is attached to another program
Trust exploitation attack
Malicious software that is attached to another program
Ping of death
Malicious software that is attached to another program
Information warfare
Malicious software that is attached to another program
Malicious code attack
Malicious software that is attached to another program
Autorooters
Malicious software that is attached to another program
Terrorist incident
Malicious software that is attached to another program
Network reconnaissance
Malicious software that is attached to another program
Virus
An attack that combines features of several DoS attacks
Stacheldraht
An attack that combines features of several DoS attacks
Loss of availability
An attack that combines features of several DoS attacks
Trust exploitation attack
An attack that combines features of several DoS attacks
Ping of death
An attack that combines features of several DoS attacks
Information warfare
An attack that combines features of several DoS attacks
Malicious code attack
An attack that combines features of several DoS attacks
Autorooters
An attack that combines features of several DoS attacks
Terrorist incident
An attack that combines features of several DoS attacks
Network reconnaissance
An attack that combines features of several DoS attacks
Virus
Gathering of information about a target network using publicly available data
Stacheldraht
Gathering of information about a target network using publicly available data
Loss of availability
Gathering of information about a target network using publicly available data
Trust exploitation attack
Gathering of information about a target network using publicly available data
Ping of death
Gathering of information about a target network using publicly available data
Information warfare
Gathering of information about a target network using publicly available data
Malicious code attack
Gathering of information about a target network using publicly available data
Autorooters
Gathering of information about a target network using publicly available data
Terrorist incident
Gathering of information about a target network using publicly available data
Network reconnaissance
Gathering of information about a target network using publicly available data
Virus
Attacks that send oversized IP packets to a computer system
Stacheldraht
Attacks that send oversized IP packets to a computer system
Loss of availability
Attacks that send oversized IP packets to a computer system
Trust exploitation attack
Attacks that send oversized IP packets to a computer system
Ping of death
Attacks that send oversized IP packets to a computer system
Information warfare
Attacks that send oversized IP packets to a computer system
Malicious code attack
Attacks that send oversized IP packets to a computer system
Autorooters
Attacks that send oversized IP packets to a computer system
Terrorist incident
Attacks that send oversized IP packets to a computer system
Network reconnaissance
Attacks that send oversized IP packets to a computer system
Virus
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
63
The adverse impact of a hacking attack or intrusion can also be described in terms of what three types of losses?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
64
List and describe the negative economic effects an organization could endure as a result of computer attacks or intrusions.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
65
What should organizations do to help recover small systems after a computer attack?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 65 flashcards in this deck.