Quiz 3: Network Security
Computing
Q 1Q 1
The threat environment includes ________.
A)attackers
B)attacks
C)both A and B
D)neither A nor B
Free
Multiple Choice
C
Q 2Q 2
Which phase of the plan-protect-respond cycle takes the largest amount of work?
A)plan
B)protect
C)respond
D)Each phase requires about equal effort.
Free
Multiple Choice
B
Free
Multiple Choice
C
Free
True False
Free
True False
Free
Multiple Choice
Q 7Q 7
The generic name for a security flaw in a program is a ________.
A)virus
B)malware
C)security fault
D)vulnerability
Free
Multiple Choice
Q 8Q 8
A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.
A)malware
B)security error
C)vulnerability
D)security fault
Free
Multiple Choice
Q 9Q 9
Users typically can eliminate a vulnerability in one of their programs by ________.
A)installing a patch
B)doing a zero-day installation
C)using an antivirus program
D)all of the above
Free
Multiple Choice
Free
True False
Free
True False
Free
True False
Q 13Q 13
Viruses most commonly spread from one computer to another ________.
A)via e-mail
B)by propagating directly by themselves
C)through obfuscation
D)all of the above
Free
Multiple Choice
Q 14Q 14
An action that will stop many viruses is ________.
A)installing a firewall
B)the use of an antivirus program
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 15Q 15
An action that will stop many viruses is ________.
A)installing patches
B)the use of an antivirus program
C)both A and B
D)neither A nor B
Free
Multiple Choice
Free
True False
Q 17Q 17
Which of the following attach themselves to other programs?
A)viruses
B)worms
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 18Q 18
Which of the following sometimes uses direct propagation between computers?
A)viruses
B)worms
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 19Q 19
Which of the following is a propagation vector for some worms?
A)e-mail
B)direct propagation
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 20Q 20
Which of the following can spread more rapidly?
A)directly-propagating viruses
B)directly-propagating worms
C)Both of the above can spread with approximately equal speed.
Free
Multiple Choice
Q 21Q 21
Which of the following can thwart directly-propagating worms?
A)firewalls
B)antivirus programs
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 22Q 22
Which of the following can thwart directly-propagating worms?
A)applying patches
B)firewalls
C)both A and B
D)neither A nor B
Free
Multiple Choice
Free
True False
Free
True False
Free
True False
Free
True False
Free
Multiple Choice
Q 28Q 28
Pieces of code that are executed after the virus or worm has spread are called ________.
A)vulnerabilities
B)exploits
C)compromises
D)payloads
Free
Multiple Choice
Q 29Q 29
Malware programs that masquerade as system files are called ________.
A)viruses
B)scripts
C)payloads
D)Trojan horses
Free
Multiple Choice
Q 30Q 30
Trojan horses can get onto computers by ________.
A)self-propagation
B)hackers
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 31Q 31
Trojan horses can get onto computers by ________.
A)viruses
B)hackers
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 32Q 32
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.
A)keystroke loggers
B)anti-privacy software
C)spyware
D)data mining software
Free
Multiple Choice
Q 33Q 33
A program that can capture passwords as you enter them is ________.
A)a keystroke logger
B)data mining software
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 34Q 34
Tricking users into doing something against their interests is ________.
A)social engineering
B)hacking
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 35Q 35
________ is lying to get victims to do something against financial self interest.
A)Social engineering
B)Fraud
Free
Multiple Choice
Q 36Q 36
Unsolicited commercial e-mail is better known as ________.
A)spam
B)adware
C)social engineering
D)identity theft
Free
Multiple Choice
Q 37Q 37
Spam can be used to ________.
A)implement a fraud
B)cause the reader to go to a website that will download malware to the victim's computer
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 38Q 38
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username,password,or other sensitive information is called ________.(Select the most specific answer.)
A)phishing
B)identity theft
C)social engineering
D)a spyware attack
Free
Multiple Choice
Free
True False
Q 40Q 40
Credit card number thieves are called ________.(Pick the most precise answer.)
A)numbers racketeers
B)fraudsters
C)identity thieves
D)carders
Free
Multiple Choice
Q 41Q 41
Which of the following tends to be more damaging to the victim?
A)credit card theft
B)identity theft
C)Both are about equally damaging to the victim.
Free
Multiple Choice
Free
True False
Q 43Q 43
The last stage in a hacking attack is ________.
A)scanning
B)the break-in
C)creating a back door
D)none of the above
Free
Multiple Choice
Free
True False
Q 45Q 45
Hackers identify possible victim computers by sending ________.
A)scouts
B)probe packets
C)exploits
D)Mocking Jays
Free
Multiple Choice
Q 46Q 46
Hackers send probe packets to identify ________.
A)IP addresses with active hosts
B)hosts running certain applications
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 47Q 47
Methods that hackers use to break into computers are ________.
A)cracks
B)magics
C)exploits
D)compromises
Free
Multiple Choice
Q 48Q 48
After a break-in,the first step usually is to ________.
A)do damage manually
B)delete log files
C)create a backdoor
D)download a hacker toolkit
Free
Multiple Choice
Q 49Q 49
What does a hacker usually do IMMEDIATELY after downloading a hacker toolkit?
A)install a Trojan horse
B)create a backdoor
C)execute an exploit
D)delete log files
Free
Multiple Choice
Q 50Q 50
A way back into a system that an attacker can use to get into the compromised computer later is called a ________.(Choose the most specific answer.)
A)backdoor
B)Trojan horse
C)compromise
D)rootkit
Free
Multiple Choice
Q 51Q 51
Which of the following can be a type of backdoor?
A)A new account
B)A Trojan horse
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 52Q 52
DoS attacks attempt to ________.
A)hack a computer
B)reduce the availability of a computer
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 53Q 53
Attack programs that can be remotely controlled by an attacker are ________.
A)bots
B)DoS programs
C)exploits
D)sock puppets
Free
Multiple Choice
Q 54Q 54
Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)
A)Trojan horses
B)bots
C)viruses
D)worms
Free
Multiple Choice
Q 55Q 55
In distributed DoS attacks,the attacker sends messages directly to ________.
A)bots
B)the intended victim of the DoS attack
C)backdoors
D)DOS servers
Free
Multiple Choice
Q 56Q 56
Most hackers today are driven by curiosity,a sense of power,and,sometimes,a desire to increase their reputation among peers.
Free
True False
Free
True False
Q 58Q 58
What are the most dangerous types of employees?
A)financial employees
B)manufacturing employees
C)IT security employees
D)former employees
Free
Multiple Choice
Q 59Q 59
What type of attacker are most attackers today?
A)disgruntled employees and ex-employees
B)criminals
C)hackers motivated by a sense of power
D)cyberterrorists
Free
Multiple Choice
Free
True False
Q 61Q 61
What type of attacker can do the most damage?
A)criminal attackers
B)hackers driven by curiosity
C)employees and ex-employees
D)national governments
Free
Multiple Choice
Free
True False
Q 63Q 63
Which of the following is not one of the four major security planning principles?
A)perimeter defense
B)risk analysis
C)comprehensive security
D)defense in depth
Free
Multiple Choice
Q 64Q 64
Balancing threats against protection costs is called ________.
A)economic justification
B)risk analysis
C)comprehensive security
D)defense in depth
Free
Multiple Choice
Free
True False
Q 66Q 66
Attackers only need to find a single weakness to break in.Consequently,companies must ________.
A)have comprehensive security
B)have insurance
C)do risk analysis
D)only give minimum permissions
Free
Multiple Choice
Q 67Q 67
An attacker must break through two firewalls to get to a host.This illustrates the principle called ________.(Select the most specific answer.)
A)comprehensive security
B)risk assurance
C)having a DMZ
D)defense in depth
Free
Multiple Choice
Q 68Q 68
Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.
A)have comprehensive security
B)have defense in depth
C)do risk analysis
D)only give minimum permissions
Free
Multiple Choice
Q 69Q 69
Access control involves ________.
A)limiting access to each resource
B)limiting the permissions of users to each resource
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 70Q 70
Actions that people are allowed to take on a resource comes under the heading of ________.
A)hacks
B)permissions
C)exploits
D)risks
Free
Multiple Choice
Q 71Q 71
In general,authenticated users should be given maximum permissions in a resource so that they can do their jobs with few restrictions.
Free
True False
Q 72Q 72
Which of the following specifies what should be done?
A)policies
B)implementation
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 73Q 73
A policy specifies ________.
A)what should be done
B)how to do it
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 74Q 74
Policies are separated by implementation to take advantage of ________.
A)implementer knowledge
B)the delegation of work principle
C)minimum permissions
Free
Multiple Choice
Free
True False
Q 76Q 76
Implementation guidance is less specific than _______.
A)policy
B)implementation
C)standards
D)none of the above
Free
Multiple Choice
Q 77Q 77
Which of the following must be followed?
A)standards
B)guidelines
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 78Q 78
Which of the following is true?
A)guidelines must be followed
B)guidelines must be considered
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 79Q 79
Oversight activities include ________.
A)vulnerability testing
B)creating guidelines
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 80Q 80
Attacking your own firm occurs in ________.
A)vulnerability testing
B)auditing
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 81Q 81
Policies should drive ________.
A)implementation
B)oversight
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 82Q 82
Requiring someone requesting to use a resource to prove his or her identity is ________.
A)confidentiality
B)authentication
C)authorization
D)both B and C
Free
Multiple Choice
Q 83Q 83
In authentication,the ________ is the party trying to prove his or her identity.
A)supplicant
B)verifier
C)true party
D)all of the above
Free
Multiple Choice
Q 84Q 84
________ is the general name for proofs of identity in authentication.
A)Credentials
B)Authorizations
C)Certificates
D)Signatures
Free
Multiple Choice
Q 85Q 85
Authentication should generally be _____.
A)as strong as possible
B)appropriate for a specific resource
C)the same for all resources, for consistency
D)all of the above
Free
Multiple Choice
Q 86Q 86
Passwords are widely used because ________.
A)they can be used at little or no additional cost
B)they offer very strong authentication
C)both A and B
D)neither A nor B
Free
Multiple Choice
Free
True False
Free
True False
Q 89Q 89
Passwords are widely used because they ________.
A)are demanded by users
B)offer strong authentication
C)are the only authentication techniques known by most security professionals
D)are inexpensive to use
Free
Multiple Choice
Q 90Q 90
A user picks the password tiger.This is likely to be cracked most quickly by a(n)________.
A)attack on an application running as root
B)brute-force attack
C)dictionary attack
D)hybrid dictionary attack
Free
Multiple Choice
Q 91Q 91
Prepare2 can be cracked most quickly by a(n)________.
A)authentication attack
B)brute-force attack
C)dictionary attack
D)hybrid dictionary attack
Free
Multiple Choice
Q 92Q 92
A password that can be defeated by a hybrid dictionary attack can be adequately long if it ________.
A)can only be broken by a brute force-attack
B)is sufficiently long
C)begins with a capital letter and ends with a digit (number)
D)none of the above
Free
Multiple Choice
Q 93Q 93
A password that can be broken by a dictionary attack or a dictionary attack in hybrid mode can be adequately strong if it is very long.
Free
True False
Q 94Q 94
A password cracking attack that tries all combinations of keyboard characters is called a ________.
A)dictionary attack
B)hybrid mode dictionary attack
C)brute force attack
D)comprehensive keyboard attack
Free
Multiple Choice
Q 95Q 95
To defeat brute-force attacks,a password must be ________.
A)long
B)complex
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 96Q 96
With complex passwords,adding a single character increases the number of passwords that must be tried in brute force guessing by a factor of about ________.
A)2
B)10
C)25
D)70
Free
Multiple Choice
Q 97Q 97
With a complex password,adding two characters will require the attacker to make more than 1,000 more attempts to crack the password.
Free
True False
Q 98Q 98
According to the book,passwords should be at least ________ characters long.
A)6
B)8
C)12
D)20
Free
Multiple Choice
Q 99Q 99
The password velociraptor can be defeated most quickly by a ________.
A)dictionary attack
B)hybrid mode dictionary attack
C)brute-force attack
D)None of the above because it is more than 8 characters long.
Free
Multiple Choice
Free
True False
Q 101Q 101
The password Velociraptor can be defeated most quickly by a ________.
A)dictionary attack
B)hybrid mode dictionary attack
C)brute force attack
D)All of the above could defeat the password equally quickly.
Free
Multiple Choice
Free
True False
Q 103Q 103
The password NeVEr can be defeated by a ________.
A)dictionary attack
B)hybrid dictionary attack
C)brute force attack
D)none of the above
Free
Multiple Choice
Free
True False
Q 105Q 105
The password R7%t& can be defeated by a ________.
A)dictionary attack
B)hybrid mode dictionary attack
C)brute-force attack
D)All of the above could defeat the password equally quickly.
Free
Multiple Choice
Free
True False
Q 107Q 107
The password 7u3aB& can be defeated most quickly by a ________.
A)simple dictionary attack
B)hybrid mode dictionary attack
C)brute-force attack
D)All of the above could defeat the password equally quickly.
Free
Multiple Choice
Free
True False
Free
True False
Q 110Q 110
Which of the following is a criterion by which biometrics can be judged?
A)cost
B)susceptibility to deception
C)both A and B
D)neither A nor B
Free
Multiple Choice
Free
True False
Q 112Q 112
Iris scanning is attractive because of its ________.
A)low cost
B)precision
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 113Q 113
Which of the following can be done today without the target's knowledge?
A)iris scanning
B)face recognition
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 114Q 114
In digital certificate authentication,the supplicant does a calculation with ________.
A)the supplicant's private key
B)the verifier's private key
C)the true party's private key
D)none of the above
Free
Multiple Choice
Q 115Q 115
In digital certificate authentication,the verifier uses ________.
A)the supplicant's public key
B)the verifier's public key
C)the true party's public key
D)none of the above
Free
Multiple Choice
Q 116Q 116
In digital certificate authentication,the verifier uses ________.
A)the supplicant's public key
B)the true party's public key
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 117Q 117
The digital certificate provides the ________.
A)private key of the supplicant
B)private key of the true party
C)public key of the supplicant
D)none of the above
Free
Multiple Choice
Q 118Q 118
In digital certificate authentication,the verifier gets the key it needs directly from the ________.
A)supplicant
B)verifier
C)true party
D)certificate authority
Free
Multiple Choice
Q 119Q 119
In authentication,defense in depth is provided through ________.
A)the use of digital certificates
B)passing authentication messages through firewalls
C)two-factor authentication
D)none of the above
Free
Multiple Choice
Q 120Q 120
Two-factor authentication usually will work even if the attacker controls the supplicant's computer.
Free
True False
Q 121Q 121
Two-factor authentication usually will work even if the attacker can intercept all authentication communication.
Free
True False
Q 122Q 122
Two-factor authentication usually will work ________.
A)even if the attacker controls the supplicant's computer
B)even if the attacker can intercept all authentication communication
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 123Q 123
When a firewall identifies an attack packet,it ________.
A)discards the packet
B)copies information about the packet into a log file
C)both A and B
D)neither A nor B
Free
Multiple Choice
Free
True False
Q 125Q 125
A firewall will drop a packet if it ________.
A)is a definite attack packet
B)is a probable attack packet
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 126Q 126
Firewall log files should be read ________.
A)every hour
B)every day
C)every week
D)usually only when a serious attack is suspected
Free
Multiple Choice
Q 127Q 127
Egress filtering examines packets ________.
A)arriving from the outside
B)leaving to the outside
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 128Q 128
Static packet filtering ________.
A)only looks at a single packet at a time, without context
B)may be used for pre-screening before the main packet firewall
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 129Q 129
ACLs are used for packets in the ________ state.
A)connection-opening
B)ongoing communication
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 130Q 130
When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.
A)drops the packet
B)drops the packet and notifies an administrator
C)passes the packet
D)passes the packet, but notifies an administrator
Free
Multiple Choice
Q 131Q 131
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall,the firewall ________.(Read this question carefully.)
A)drops the packet
B)passes the packet
C)opens a new connection
D)does not approve the connection
Free
Multiple Choice
Q 132Q 132
Stateful firewalls are attractive because of their ________.
A)high filtering sophistication
B)ability to filter complex application content
C)QoS guarantees
D)low cost
Free
Multiple Choice
Q 133Q 133
________ is the dominant firewall filtering method used on main border firewalls today.
A)ACL filtering
B)Application content filtering
C)Stateful packet inspection
D)None of the above
Free
Multiple Choice
Q 134Q 134
How will an SPI firewall handle a packet containing a TCP segment which is an acknowledgement?
A)process it through the ACL
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 135Q 135
How will an SPI firewall handle a packet containing a TCP SYN segment?
A)process it through the ACL
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 136Q 136
How will an SPI firewall handle a packet containing a TCP FIN segment?
A)process it through the ACL
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 137Q 137
Which type of firewall filtering collects streams of packets to analyze them as a group?
A)static packet filtering
B)stateful packet inspection
C)deep inspection
D)none of the above
Free
Multiple Choice
Q 138Q 138
Which type of firewall filtering looks at application-layer content?
A)static packet filtering
B)stateful packet inspection
C)deep inspection
D)all of the above
Free
Multiple Choice
Q 139Q 139
What type of filtering does an application-aware firewall use?
A)static packet filtering
B)stateful packet inspection
C)deep inspection
D)all of the above
Free
Multiple Choice
Q 140Q 140
Deep inspection firewalls grew out of ________.
A)static packet filtering
B)stateful packet inspection
C)intrusion detection systems
D)none of the above
Free
Multiple Choice
Q 141Q 141
ASIC technology has been critical to the development of ________.
A)static packet filtering
B)stateful packet inspection
C)deep packet inspection
D)none of the above
Free
Multiple Choice
Free
Multiple Choice
Q 143Q 143
Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.
A)authentication
B)confidentiality
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 144Q 144
In two-way dialogues using symmetric key encryption,how many keys are used for encryption and decryption?
A)1
B)2
C)4
D)none of the above
Free
Multiple Choice
Q 145Q 145
In symmetric key encryption,a key must be ________ bits long or longer to be considered strong.(Choose the choice closest to the correct answer.)
A)40
B)56
C)128
D)1,024
Free
Multiple Choice
Q 146Q 146
Electronic signatures provide message-by-message ________.
A)authentication
B)confidentiality
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 147Q 147
Electronic signatures provide message-by-message ________.
A)integrity
B)authentication
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 148Q 148
Which of the following is not one of the four response phases for when attacks occur?
A)detecting the attack
B)stopping the attack
C)repairing the damage
D)All of the above are response phases.
Free
Multiple Choice
Q 149Q 149
Forensic procedures are ways to capture and safeguard data in ways that fit rules of evidence in court proceedings.
Free
True False
Q 150Q 150
Computer security incident response teams (CSIRTs)are used in ________.
A)false alarms
B)normal incidents
C)major incidents
D)disasters
Free
Multiple Choice
Q 151Q 151
CSIRTs should include ________.
A)IT personnel
B)senior line managers
C)both A and B
D)neither A nor B
Free
Multiple Choice
Q 152Q 152
________ is the reestablishment of information technology operations after a disaster.
A)Business continuity recovery
B)Disaster recovery
Free
Multiple Choice