34 Questions
There is a simple solution to securing information. True or False?
False
Smartphones are not a new target for security attacks. True or False?
False
One of the difficulties in defending against attacks is decreased speed of attacks. True or False?
False
One of the difficulties in defending against attacks is delays in patching. True or False?
True
User confusion is not a difficulty in defending against attacks. True or False?
False
Universally connected devices do not pose any difficulties in defending against attacks. True or False?
False
The Slammer worm infected 75,000 computers in the first 11 minutes of its release.
True
Slammer infections doubled every 8.5 seconds.
True
Slammer scanned 55 million computers per second.
True
Attackers today use common Internet tools and protocols to send malicious data and commands.
True
Day zero attacks occur when an attacker discovers and exploits previously unknown flaws.
True
Vendors are overwhelmed trying to keep pace with updating their products against attacks.
True
Distributed attacks involve many attackers against one, making it difficult to stop the attack by identifying and blocking the source.
True
Information security completely prevents attacks and guarantees that a system is totally secure.
False
Before defense is possible, one must understand what information security is, why it is important, and who the attackers are.
True
Preventive measures, rapid response, and preemptive attacks are steps to protect person or property from harm in information security.
True
What is the primary objective of malware?
To conceal the malware's malicious actions
Which type of malware is designed to bring profit from its actions?
Malware for Profit
What is the main characteristic of social engineering attacks?
They exploit human psychology and behavior
Which type of malware enters a computer system without the owner's knowledge or consent?
Viruses
What is the significance of concealing malware's malicious actions?
To operate without the owner's knowledge or consent
Which statement best describes the purpose of infecting malware?
To infect a computer system
What is a virus's main purpose when it infects a file or program?
To replicate itself and spread to other files or programs
What is the distinguishing feature of a worm compared to a virus?
Worms automatically spread to other computers, while viruses rely on user action to spread
What does a Trojan horse typically involve?
Performing the activity it promises while secretly collecting information for an attacker
What is the primary purpose of rootkits used by attackers?
To hide the attacker's actions or presence
What is the key difference between a macro virus and a program virus?
Macro viruses execute scripts, while program viruses infect executable files
What is the intended target of a boot virus?
The Master Boot Record (MBR) of a hard disk drive
What action does a worm take advantage of in order to enter a system?
Exploiting a vulnerability in an application or an operating system
What does a resident virus do each time the computer is turned on?
Infect files opened by the user or operating system
What type of program conceals its true purpose and performs harmful actions?
.exe files that pretend to be performing one activity but actually do something else
How does a virus spread to other computers?
By exploiting vulnerabilities in applications or operating systems, allowing it to enter other systems
What is the main purpose of a worm's payload?
To activate malicious code designed to harm infected systems
What is the target of a boot virus?
The Master Boot Record (MBR) of a hard disk drive
Test your knowledge about the challenges of securing information, types of attackers, basic steps of an attack, and the five basic principles of defense. This quiz is based on the 'Security+ Guide to Network Security Fundamentals, Fourth Edition' Chapter 1.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free