CSCI 4200 quiz questions || with 100% Errorless Solutions.
4 views 0 purchase
Course
CSCI 4200
Institution
CSCI 4200
What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988? correct answers The Morris Worm
What is the most common threat to information security in an organization? correct answers Computer Viruses
The term "script kiddies" refers to corr...
CSCI 4200 quiz questions || with 100% Errorless Solutions.
What is the most common name for the first large-scale attack on the Internet that occurred in
November of 1988? correct answers The Morris Worm
What is the most common threat to information security in an organization? correct answers
Computer Viruses
The term "script kiddies" refers to correct answers A hacker of low-end technical ability
What is a structured threat? correct answers A structured threat is an attack that uses
coordination, insiders, and lasts for a long time.
What is a port scan? correct answers Identifies ports that are open and services that are running
Who is Kevin Mitnick? correct answers He used social engineering, sniffers, and cloned cell
phones to gain unauthorized access to networks belonging to Motorola, Novell, Fujitsu, and Sun
Microsystems.
What was the Slammer Worm/Virus? correct answers Malware that exploited Microsoft SQL
Server and spread across the world in just 10 minutes.
If the system is infected with a time bomb, it means that correct answers it has a piece of
malicious code that will be triggered at a certain time.
A successful attack on a network may adversely impact security in all the following ways
EXCEPT: correct answers Loss of functionality
When information is modified by individuals not authorized to change it you have suffered a
correct answers Loss of integrity
According to the Computer Crime and Security Survey, the four types of attacks that increased
from 2007 to 2008 were correct answers Unauthorized access, theft/loss of proprietary
information, misuse of web applications, and DNS attacks
The message "Hacked by Chinese," was left by the correct answers Code Red Worm
The term which refers to the attempt to gain unauthorized access to systems and computers used
by a telephone company to operate its telephone network is a _______. correct answers phreaker
Jane is in the finance department. Although she should not be able to modify files or folders from
the marketing department, she can, and does. This a problem of ___________. correct answers
integrity
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.