00:00
01:07
In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.
extortion
Under current U.S. federal laws, if a company allows personal information to be stolen, it may be subject to government fines.
...
Exam final ITN 266
Countries would engage in cyberwar - Answer Both before a physical attack and after a
physical attack
Neither before a physical attack nor after a physical attack
The definition of spam is "unsolicited commercial e-mail." - Answer true
In ________, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest. - Answer extortion
Under current U.S. federal laws, if a company allows personal information to be stolen,
it may be subject to government fines. - Answer true
Downloading pornography can lead to sexual harassment lawsuits. - Answer true
Cyberwar consists of computer-based attacks conducted by ________. - Answer
national goverments
________ can spread through e-mail attachments. - Answer both viruses and worms
A program that gives the attacker remote access control of your computer is specifically
called a ________. - Answer RAT
In pretexting, an attacker calls claiming to be a certain person in order to ask for private
information about that person. - Answer true
A(n) ________ attack requires a victim host to prepare for many connections, using up
resources until the computer can no longer serve legitimate users. (Choose the most
specific choice.) - Answer SYN Flooding
Mobile code usually is delivered through ________. - Answer webpages
Most cookies are dangerous. - Answer false
If a company wishes to prosecute people or companies that steal its trade secrets, it
must take ________ precautions to protect those trade secrets. - Answer reasonable
Which of the following are types of countermeasures? - Answer all of these
About how long was the Sony PlayStation Network offline as a result of the cyber
attacks? - Answer 3 weeks
Some ________ can jump directly between computers without human intervention. -
Answer worms
, The attack method used in the Sony data breaches was ________. - Answer SQL
injection
Carding is more serious than identity theft. - Answer false
________ is a generic term for "evil software." - Answer malware
When a threat succeeds in causing harm to a business, this is a(n) ________. - Answer
breach
Botnets usually have multiple owners over time. - Answer true
Which of the following are ways that trade secret espionage occur? - Answer all of
these
Another name for safeguard is ________. - Answer countermeasure
Sending packets with false IP source addresses is called ________. - Answer IP
address spoofing
Most countermeasure controls are preventative controls. - Answer true
A ________ is a type of fix for vulnerabilities. - Answer Both work-around and service
pack
A private key/public key pair is usually created by the ________. - Answer client
________ is necessary to protect the host against attacks. - Answer Host hardening
UNIX offers ________ directory and file permissions than (as) Windows. - Answer fewer
In the context of PKI, ________ is the process of accepting public keys and providing
new digital certificates to the users. - Answer provisioning
Inheritance ________ labor costs in assigning permissions. - Answer reduces
A ________ is a small device that plugs into a standard computer port to identify the
owner. - Answer USB token
________ often get their authentication information from ________. - Answer Central
authentication servers, directory servers
In Kerberos, the ________ is the supplicant's proof that it has already authenticated
itself with the Kerberos Server. - Answer ticket granting ticket
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.