ITCS318 Long Quiz Reviewer
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of attack occurs when data goes beyond the memory areas allocated to an application?

  • Buffer overflow (correct)
  • SQL injection
  • RAM spoofing
  • RAM injection
  • Which of the following statements describes a distributed denial of service (DDoS) attack?

  • A botnet of zombies, coordinated by an attacker, overwhelms a server with DoS attacks (correct)
  • An attacker monitors network traffic to learn authentication credentials
  • One computer accepts data packets based on the MAC address of another computer
  • An attacker sends an enormous quantity of data that a server cannot handle
  • Employees in an organization report that the network access is slow. Further investigation reveals that one employee downloaded a third-party scanning program for the printer. What type of malware may have been introduced?

  • Trojan horse
  • Worm (correct)
  • Spam
  • Phishing
  • Employees in an organization report that they cannot access the customer database on the main server. Further investigation reveals that the database file is now encrypted. Shortly afterward, the organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?

    <p>Ransomware</p> Signup and view all the answers

    A penetration test carried out by an organization identified a backdoor on the network. What action should the organization take to find out if their systems have been compromised?

    <p>Look for unauthorized accounts</p> Signup and view all the answers

    What non-technical method could a cybercriminal use to gather sensitive information from an organization?

    <p>Social engineering</p> Signup and view all the answers

    A secretary receives a phone call from someone claiming that their manager is about to give an important presentation but the presentation files are corrupted. The caller sternly asks that the secretary email the presentation right away to a personal email address. The caller also states that the secretary is being held personally responsible for the success of this presentation. What type of social engineering tactic is the caller using?

    <p>Intimidation</p> Signup and view all the answers

    All employees in an organization receive an email stating that their account password will expire immediately and that they should reset their password within five minutes. Which of the following statements best describes this email?

    <p>It is a hoax</p> Signup and view all the answers

    Which best practices can help defend against social engineering attacks? (Choose three.)

    <p>Educate employees regarding security policies</p> Signup and view all the answers

    What do you call an impersonation attack that takes advantage of a trusted relationship between two systems?

    <p>Man-in-the-middle</p> Signup and view all the answers

    A cybercriminal sends a series of maliciously formatted packets to a database server, which causes the server to crash. What do you call this type of attack?

    <p>DoS</p> Signup and view all the answers

    The awareness and identification of vulnerabilities is a critical function of a cybersecurity specialist. Which of the following resources can they use to identify specific details about vulnerabilities?

    <p>ISO/IEC 27000 model</p> Signup and view all the answers

    Which security measure is typically found both inside and outside a data center facility?

    <p>exit sensors</p> Signup and view all the answers

    What is hyperjacking?

    <p>Taking over a virtual machine hypervisor as part of a data center attack</p> Signup and view all the answers

    Which statement accurately characterizes the evolution of threats to network security?

    <p>Internal threats can cause even greater damage than external threats.</p> Signup and view all the answers

    When considering network security, what is the most valuable asset of an organization?

    <p>data</p> Signup and view all the answers

    Which resource is affected due to weak security settings for a device owned by the company, but housed in another location?

    <p>cloud storage device</p> Signup and view all the answers

    Refer to the exhibit. An IT security manager is planning security updates on this particular network. Which type of network is displayed in the exhibit and is being considered for updates?

    <p>WAN</p> Signup and view all the answers

    What are two security features commonly found in a WAN design? (Choose two.)

    <p>firewalls protecting the main and remote sites</p> Signup and view all the answers

    Which security technology is commonly used by a teleworker when accessing resources on the main corporate office network?

    <p>VPN</p> Signup and view all the answers

    Which technology is used to secure, monitor, and manage mobile devices?

    <p>MDM</p> Signup and view all the answers

    Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?

    <p>Hop Limit</p> Signup and view all the answers

    An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?

    <p>man in the middle</p> Signup and view all the answers

    Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?

    <p>Time-to-Live</p> Signup and view all the answers

    What is involved in an IP address spoofing attack?

    <p>A legitimate network IP address is hijacked by a rogue node.</p> Signup and view all the answers

    Which type of attack involves the unauthorized discovery and mapping of network systems and services?

    <p>reconnaissance</p> Signup and view all the answers

    In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?

    <p>SYN flood attack</p> Signup and view all the answers

    How is optional network layer information carried by IPv6 packets?

    <p>inside an extension header</p> Signup and view all the answers

    A threat actor wants to interrupt a normal TCP communication between two hosts by sending a spoofed packet to both endpoints. Which TCP option bit would the threat actor set in the spoofed packet?

    <p>RST</p> Signup and view all the answers

    A threat actor uses a program to launch an attack by sending a flood of UDP packets to a server on the network. The program sweeps through all of the known ports trying to find closed ports. It causes the server to reply with an ICMP port unreachable message and is similar to a DoS attack. Which two programs could be used by the threat actor to launch the attack? (Choose two.)

    <p>Low Orbit Ion Cannon</p> Signup and view all the answers

    Which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header?

    <p>header checksum</p> Signup and view all the answers

    What kind of ICMP message can be used by threat actors to map an internal IP network?

    <p>ICMP echo request</p> Signup and view all the answers

    Users in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack?

    <p>SYN flood</p> Signup and view all the answers

    Which action best describes a MAC address spoofing attack?

    <p>altering the MAC address of an attacking host to match that of a legitimate host</p> Signup and view all the answers

    What is an objective of a DHCP spoofing attack?

    <p>to gain illegal access to a DHCP server and modify its configuration</p> Signup and view all the answers

    What is the primary means for mitigating virus and Trojan horse attacks?

    <p>antivirus software</p> Signup and view all the answers

    What method can be used to mitigate ping sweeps?

    <p>blocking ICMP echo and echo-replies at the network edge</p> Signup and view all the answers

    What worm mitigation phase involves actively disinfecting infected systems?

    <p>treatment</p> Signup and view all the answers

    What is the result of a DHCP starvation attack?

    <p>Legitimate clients are unable to lease IP addresses.</p> Signup and view all the answers

    Which term is used for bulk advertising emails flooded to as many end users as possible?

    <p>Spam</p> Signup and view all the answers

    Which type of DNS attack involves the cybercriminal compromising a parent domain and creating multiple subdomains to be used during the attacks?

    <p>cache poisoning</p> Signup and view all the answers

    Which protocol would be the target of a cushioning attack?

    <p>DNS</p> Signup and view all the answers

    Which language is used to query relational database?

    <p>SQL</p> Signup and view all the answers

    Which two attacks target web servers through exploiting possible vulnerabilities of input functions used by an application? (Choose two.)

    <p>cross-site scripting</p> Signup and view all the answers

    In which type of attack is falsified information used to redirect users to malicious Internet sites?

    <p>DNS cache poisoning</p> Signup and view all the answers

    What is a characteristic of a DNS amplification and reflection attack?

    <p>Threat actors use DNS open resolvers to increase the volume of attacks and to hide the true source of an attack.</p> Signup and view all the answers

    City Center Hospital provides WLAN connectivity to its employees. The security policy requires that communication between employee mobile devices and the access points must be encrypted. What is the purpose of this requirement?

    <p>to prevent a computer virus on a mobile device from infecting other devices</p> Signup and view all the answers

    What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

    <p>MAC filtering</p> Signup and view all the answers

    Study Notes

    ITCS318 - Long Quiz Reviewer

    • SQL injection: Data goes beyond allocated memory areas.
    • RAM injection: Data exceeds RAM allocation.
    • RAM spoofing: Mimicking RAM behavior.
    • Buffer overflow: Data exceeding buffer capacity.
    • Distributed Denial of Service (DDoS): Attacker floods server with enormous data.
    • Denial of Service (DoS): Attacker overwhelms server with data.
    • Network Traffic Monitoring: Observing network traffic.
    • Authentication Credentials: Learning login details.
    • MAC Address: Unique hardware identifier.
    • Botnet Zombies: Computers under control.
    • Data Encryption: Coding data.
    • Malware Analysis: Identifying malicious software.
    • Third-Party Scanning Program: Software downloaded by user.
    • Worm: Self-replicating malware.
    • Trojan Horse: Malicious software disguised as legitimate.
    • Spam/Phishing: Unsolicited emails/fraudulent emails.
    • Ransomware: Attacker encrypts data and demands payment.
    • Data Loss Prevention (DLP): Preventing data leaks.
    • Social Engineering: Manipulating individuals for info.

    Attack Characteristics and Methods

    • Unauthorized Account Access: Gaining access without permission.
    • Unauthorized Accounts/Passwords: Finding accounts without passwords.
    • Cybercriminal Techniques: Gathering info from an organization.
    • Man-in-the-Middle Attack: Intercepts communications.
    • Ransomware: Encrypts data and demands payment.
    • Social Engineering: Manipulation to gain info.
    • Spoofing: Masquerading as trusted source.
    • Impersonation: Assuming someone else's identity.
    • Hoax/Piggyback: False info/hiding attacks.
    • DDoS Attacks: Overwhelming servers with requests.

    Security Best Practices

    • Firewall Appliances: Protecting against network attacks.
    • Security Guards: Physical security measures.
    • Well-Designed Firewalls: Defense against network threats.
    • Security Protocols: Defense mechanisms.
    • Security Policies: Formal rules.
    • Educate Employees: Awareness and training.

    Network Security and Threats

    • Internal Threats: Within the organization.
    • External Threats: From outside the organization.
    • Network Security Assets: Protection of vital resources.
    • Company Data: Most valuable asset.
    • Device Security: Protecting company-owned devices.
    • Malware Malicious software.
    • Data Security: Protecting information.
    • Social Engineering Tactics: Manipulation to gain info.

    Attacks and Vulnerabilities

    • Backdoor: Unauthorized access point.
    • Penetration Testing: Assessing security.
    • Rogue Access Points: Unauthorized wireless networks.
    • MAC Address Spoofing: Masquerading as another host.
    • IP Address Spoofing: Malicious IP address used.
    • DHCP Spoofing: Provides false DHCP info.
    • Recon: Unauthorized discovery of network systems.

    Networking Technologies

    • IPv4/IPv6 Packets: Network communication protocols.
    • MAC Addresses: Hardware addresses.
    • Routing Protocols: Traffic management within a network.
    • Time-to-Live: Field in packets, preventing endless loops.
    • ARP (Address Resolution Protocol): Converting IP to MAC addresses.
    • DHCP (Dynamic Host Configuration Protocol): Automatic IP address assignments.
    • TCP/IP (Transmission Control Protocol/Internet Protocol): Common protocol suite.

    Security Measures

    • VPN (Virtual Private Network): Secure network connections.
    • Firewall: Blocking unauthorized network access.
    • WPA/WPA2/WEP: Wireless network security protocols.
    • IDS/IPS: Intrusion Detection/Prevention Systems.
    • Ports: Specific communication points.
    • IP addresses: Unique network addresses
    • Security Protocols: Policies protecting network.
    • Network Analysis: Assessing the performance of the network.

    Additional Information

    • Wireless Network Management: Managing wireless networks.
    • Threat mitigation: Reducing impact of attacks.
    • Network Security Design: Strategies for strong security.
    • Device Management: Control and monitoring of devices.
    • Security Threats: Identifying and mitigating attacks.
    • Malware Detection/Response: Tools and techniques for malware.
    • Internet Security Standards: Regulations protecting the internet.
    • Networking and Security: Combining security with network management.
    • Communication Security: Protecting data during transmission.
    • Network Protection Techniques: Strategies for safeguarding networks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    ITCS318 Long Quiz Reviewer PDF

    Description

    Prepare for your ITCS318 exam with this comprehensive long quiz reviewer. Covering critical topics such as SQL injection, malware analysis, and cybersecurity threats, this quiz will help reinforce your understanding of key concepts and techniques in information security. Test your knowledge and readiness for real-world applications in IT security.

    More Like This

    Use Quizgecko on...
    Browser
    Browser