Chapter 3 Network Security: D) Employee in A Firm Outside Target
Chapter 3 Network Security: D) Employee in A Firm Outside Target
1) The Target attackers probably first broke into Target using the credentials of a(n) ________.
A) low-level Target employee
B) Target IT employee
C) Target security employee
D) employee in a firm outside Target
3) Which of the following probably suffered the most financial damage from the Target breach?
A) Target
B) banks
C) consumers
D) POS vendors
4) Which of the following probably suffered the most financial damage from the Target breach?
A) retailers other than Target
B) banks
C) consumers
D) POS terminal vendors
7) A ________ is a flaw in a program that permits a specific attack or set of attacks against this
problem.
A) malware
B) security error
C) vulnerability
D) security fault
9) Vulnerability-based attacks that occur before a patch is available are called ________ attacks.
A) preinstallation
B) stealth
C) malware
D) zero-day
12) Viruses most commonly spread from one computer to another ________.
A) via e-mail
B) by propagating directly by themselves
C) through obfuscation
D) all of the above
13) Which of the following sometimes uses direct propagation between computers?
A) viruses
B) worms
C) Trojan horses
D) downloaders
16) Malware programs that masquerade as system files are called ________.
2
A) viruses
B) scripts
C) payloads
D) Trojan horses
18) The general name for malware on a user's PC that collects sensitive information and sends
this information to an attacker is ________.
A) keystroke loggers
B) anti-privacy software
C) spyware
D) data mining software
19) A program that can capture passwords as you enter them is ________.
A) a keystroke logger
B) data mining software
C) both A and B
D) neither A nor B
20) Small malware programs that download larger malware programs are called ________.
A) downloaders
B) scouts
C) foothold programs
D) stage-one programs
22) Pieces of code that are executed after the virus or worm has spread are called ________.
A) vulnerabilities
B) exploits
C) compromises
D) payloads
23) Tricking users into doing something against their security interests is ________.
3
A) social engineering
B) hacking
C) both A and B
D) neither A nor B
24) An attack in which an authentic-looking e-mail or website entices a user to enter his or her
username, password, or other sensitive information is called ________. (Select the most specific
answer.)
A) phishing
B) identity theft
C) social engineering
D) a spyware attack
25) An attack aimed at a single person or a small group of individuals is a(n) ________ attack.
(Choose the most specific answer.)
A) phishing
B) spear phishing
C) highly targeted
D) customized
26) Credit card number thieves are called ________. (Pick the most precise answer.)
A) numbers racketeers
B) fraudsters
C) identity thieves
D) carders
29) If you see a username and password on a Post-It note that anyone can see on a monitor, is it
hacking if you use this information to log in?
A) Yes
B) No
C) We cannot say from the information given.
30) You discover that you can get into other e-mail accounts after you have logged in under your
4
account. You spend just a few minutes looking at another user's mail. Is that hacking?
A) Yes
B) No
C) We cannot say from the information given.
31) Methods that hackers use to break into computers are ________.
A) cracks
B) magics
C) exploits
D) compromises
33) Attack programs that can be remotely controlled by an attacker are ________.
A) bots
B) DoS programs
C) exploits
D) sock puppets
34) In distributed DoS attacks, the attacker sends messages directly to ________.
A) bots
B) the intended victim of the DoS attack
C) a command and control server
D) DOS servers
35) Which of the following can be upgraded after it is installed on a victim computer? (Choose
the most specific answer.)
A) Trojan horses
B) bots
C) viruses
D) worms
5
37) What type of attacker are most of attackers today?
A) disgruntled employees and ex-employees
B) career criminals
C) hackers motivated by a sense of power
D) cyberterrorists
41) Using encryption, you make it impossible for attackers to read your messages even if they
intercept them. This is ________.
A) authentication
B) confidentiality
C) both A and B
D) neither A nor B
42) In two-way dialogues using symmetric key encryption, how many keys are used for
encryption and decryption?
A) 1
B) 2
C) 4
D) none of the above
43) In symmetric key encryption, a key must be ________ bits long, or longer, to be considered
strong. (Choose the choice closest to the correct answer.)
A) 36
B) 56
C) 64
D) 128
6
44) Electronic signatures provide message-by-message ________.
A) authentication
B) confidentiality
C) both A and B
D) neither A nor B
48) Using SSL/TLS for Web applications is attractive because SSL/TLS ________.
A) is essentially free to use
B) offers the strongest possible cryptographic protections
C) both A and B
D) neither A nor B
49) Requiring someone to use a resource to prove his or her identity is ________.
A) confidentiality
B) authentication
C) authorization
D) both B and C
50) In authentication, the ________ is the party trying to prove his or her identity.
A) supplicant
B) verifier
C) true party
D) all of the above
54) A user picks the password "tiger." This is likely to be cracked quickly by a(n) ________.
A) attack on an application running as root
B) brute-force attack
C) dictionary attack
D) reverse engineering attack
56) A password-cracking attack that tries all combinations of keyboard characters is called a
________.
A) dictionary attack
B) hybrid mode dictionary attack
C) brute-force attack
D) comprehensive keyboard attack
8
59) The password "NeVEr" can be defeated by a ________.
A) dictionary attack
B) hybrid dictionary attack
C) brute-force attack
D) none of the above
63) Which of the following can be done today without the target's knowledge?
A) iris scanning
B) face recognition
C) both A and B
D) neither A nor B
64) In digital certificate authentication, the supplicant encrypts the challenge message with
________.
A) the supplicant's private key
B) the verifier's private key
C) the true party's private key
D) none of the above
65) In digital certificate authentication, the verifier gets the key it needs directly from the
________.
A) supplicant
B) verifier
C) true party
D) certificate authority
9
66) In digital certificate authentication, the verifier uses ________.
A) the supplicant's public key
B) the true party's public key
C) both A and B
D) neither A nor B
68) Debit card is secure because it requires two credentials for authentication. This is also called
________.
A) the supplicant's authentication
B) the verifier's authentication
C) two-factor authentication
D) none of the above
10
73) ACLs are used for packets in the ________ state.
A) connection-opening
B) ongoing communication
C) both A and B
D) neither A nor B
74) When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,
the firewall usually ________.
A) drops the packet
B) drops the packet and notifies an administrator
C) passes the packet
D) passes the packet, but notifies an administrator
75) When a packet that is not part of an ongoing connection and that does not attempt to open a
connection arrives at a stateful inspection firewall, the firewall ________. (Read this question
carefully.)
A) drops the packet
B) passes the packet
C) opens a new connection
D) does not approve the connection
77) ________ is the dominant firewall filtering method used on main border firewalls today.
A) ACL filtering
B) Application content filtering
C) Stateful packet inspection
D) none of the above
78) How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP
segment which is an acknowledgement?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
79) How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP SYN
segment?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
11
80) How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP FIN
segment?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
81) Which type of firewall filtering collects streams of packets to analyze them as a group?
A) static packet filtering
B) stateful packet inspection
C) next-generation
D) none of the above
84) If a packet is highly suspicious but not a provable attack packet, a(n) ________ may drop it.
A) SPI firewall
B) IDS
C) IPS
D) all of the above
86) If a firewall does not have the processing power to filter all of the packets that arrive,
________.
A) it will pass some packets without filtering them
B) it will drop packets it cannot process
C) both A and B
D) neither A nor B
12
87) ________ look at ________, and ________ look at ________.
A) Antivirus programs, packets, firewalls, packets
B) Antivirus programs, files, firewalls, files
C) Antivirus programs, packets, firewalls, files
D) Antivirus programs, files, firewalls, packets
88) In antivirus filtering, the best ways to filter currently use ________.
A) application awareness
B) stateful inspection
C) signature detection
D) behavioral detection
13