Podcast
Questions and Answers
Which of the following is NOT one of the four broad-based categories used to classify attacks and threats in an Information Security context?
Which of the following is NOT one of the four broad-based categories used to classify attacks and threats in an Information Security context?
- Interruption
- Modification
- Interception (correct)
- Fabrication
Which category of attacks involves the creation of illegitimate information, processes, communications, or other data within a system?
Which category of attacks involves the creation of illegitimate information, processes, communications, or other data within a system?
- Interception
- Fabrication (correct)
- Interruption
- Modification
Which category of attacks involves the unauthorized access and capture of information during transmission?
Which category of attacks involves the unauthorized access and capture of information during transmission?
- Modification
- Fabrication
- Interruption
- Interception (correct)
Which category of attack primarily threatens data confidentiality?
Which category of attack primarily threatens data confidentiality?
Which category of attack primarily threatens data availability?
Which category of attack primarily threatens data availability?
Which category of attack primarily threatens data integrity?
Which category of attack primarily threatens data integrity?
Which category of attack involves injecting bogus data or creating a false trail in the system?
Which category of attack involves injecting bogus data or creating a false trail in the system?
Which of the following is an example of an interception attack?
Which of the following is an example of an interception attack?
What type of attack primarily affects integrity but could also be considered an availability attack?
What type of attack primarily affects integrity but could also be considered an availability attack?
Which attack involves generating data, processes, or communications with a system?
Which attack involves generating data, processes, or communications with a system?
What is the major attack discovered in studies of file sharing system security?
What is the major attack discovered in studies of file sharing system security?
Which tool can be used to monitor MAC to IP address mappings?
Which tool can be used to monitor MAC to IP address mappings?
What is the purpose of Dynamic ARP Inspection (DAI)?
What is the purpose of Dynamic ARP Inspection (DAI)?
Which type of switches support Dynamic ARP Inspection (DAI)?
Which type of switches support Dynamic ARP Inspection (DAI)?
Which of the following is NOT a type of attack discussed in the text?
Which of the following is NOT a type of attack discussed in the text?
What is the term used to describe situations in which an attacker masquerades as a genuine employee and tricks a third party into divulging information?
What is the term used to describe situations in which an attacker masquerades as a genuine employee and tricks a third party into divulging information?
What type of attack involves intercepting a message and keeping a copy to obtain valuable data?
What type of attack involves intercepting a message and keeping a copy to obtain valuable data?
What type of attack involves replaying genuine traffic that has been recorded previously using sniffer software?
What type of attack involves replaying genuine traffic that has been recorded previously using sniffer software?
Which type of attack is characterized by manipulating peers to issue multimedia download or streaming simultaneously, causing heavy traffic and clogging an organization's network?
Which type of attack is characterized by manipulating peers to issue multimedia download or streaming simultaneously, causing heavy traffic and clogging an organization's network?
What is the main goal of preventing unauthorized copying and online distribution of music files, as mentioned in the text?
What is the main goal of preventing unauthorized copying and online distribution of music files, as mentioned in the text?
What is the most aggressive type of P2P-DDoS attack mentioned in the text?
What is the most aggressive type of P2P-DDoS attack mentioned in the text?
What advantage do DDoS attacks have for adversaries, as mentioned in the text?
What advantage do DDoS attacks have for adversaries, as mentioned in the text?
Which of the following is a type of online brute-force attack?
Which of the following is a type of online brute-force attack?
What is a common misconception about deploying a fully switched network to the desktop?
What is a common misconception about deploying a fully switched network to the desktop?
Which technique involves sending unsolicited ARP replies to a target host in order to poison its ARP cache?
Which technique involves sending unsolicited ARP replies to a target host in order to poison its ARP cache?
What is the potential consequence of an ARP-related attack known as ARP redirection?
What is the potential consequence of an ARP-related attack known as ARP redirection?
Flashcards are hidden until you start studying