Podcast
Questions and Answers
There is a simple solution to securing information. True or False?
There is a simple solution to securing information. True or False?
False
Smartphones are not a new target for security attacks. True or False?
Smartphones are not a new target for security attacks. True or False?
False
One of the difficulties in defending against attacks is decreased speed of attacks. True or False?
One of the difficulties in defending against attacks is decreased speed of attacks. True or False?
False
One of the difficulties in defending against attacks is delays in patching. True or False?
One of the difficulties in defending against attacks is delays in patching. True or False?
Signup and view all the answers
User confusion is not a difficulty in defending against attacks. True or False?
User confusion is not a difficulty in defending against attacks. True or False?
Signup and view all the answers
Universally connected devices do not pose any difficulties in defending against attacks. True or False?
Universally connected devices do not pose any difficulties in defending against attacks. True or False?
Signup and view all the answers
The Slammer worm infected 75,000 computers in the first 11 minutes of its release.
The Slammer worm infected 75,000 computers in the first 11 minutes of its release.
Signup and view all the answers
Slammer infections doubled every 8.5 seconds.
Slammer infections doubled every 8.5 seconds.
Signup and view all the answers
Slammer scanned 55 million computers per second.
Slammer scanned 55 million computers per second.
Signup and view all the answers
Attackers today use common Internet tools and protocols to send malicious data and commands.
Attackers today use common Internet tools and protocols to send malicious data and commands.
Signup and view all the answers
Day zero attacks occur when an attacker discovers and exploits previously unknown flaws.
Day zero attacks occur when an attacker discovers and exploits previously unknown flaws.
Signup and view all the answers
Vendors are overwhelmed trying to keep pace with updating their products against attacks.
Vendors are overwhelmed trying to keep pace with updating their products against attacks.
Signup and view all the answers
Distributed attacks involve many attackers against one, making it difficult to stop the attack by identifying and blocking the source.
Distributed attacks involve many attackers against one, making it difficult to stop the attack by identifying and blocking the source.
Signup and view all the answers
Information security completely prevents attacks and guarantees that a system is totally secure.
Information security completely prevents attacks and guarantees that a system is totally secure.
Signup and view all the answers
Before defense is possible, one must understand what information security is, why it is important, and who the attackers are.
Before defense is possible, one must understand what information security is, why it is important, and who the attackers are.
Signup and view all the answers
Preventive measures, rapid response, and preemptive attacks are steps to protect person or property from harm in information security.
Preventive measures, rapid response, and preemptive attacks are steps to protect person or property from harm in information security.
Signup and view all the answers
What is the primary objective of malware?
What is the primary objective of malware?
Signup and view all the answers
Which type of malware is designed to bring profit from its actions?
Which type of malware is designed to bring profit from its actions?
Signup and view all the answers
What is the main characteristic of social engineering attacks?
What is the main characteristic of social engineering attacks?
Signup and view all the answers
Which type of malware enters a computer system without the owner's knowledge or consent?
Which type of malware enters a computer system without the owner's knowledge or consent?
Signup and view all the answers
What is the significance of concealing malware's malicious actions?
What is the significance of concealing malware's malicious actions?
Signup and view all the answers
Which statement best describes the purpose of infecting malware?
Which statement best describes the purpose of infecting malware?
Signup and view all the answers
What is a virus's main purpose when it infects a file or program?
What is a virus's main purpose when it infects a file or program?
Signup and view all the answers
What is the distinguishing feature of a worm compared to a virus?
What is the distinguishing feature of a worm compared to a virus?
Signup and view all the answers
What does a Trojan horse typically involve?
What does a Trojan horse typically involve?
Signup and view all the answers
What is the primary purpose of rootkits used by attackers?
What is the primary purpose of rootkits used by attackers?
Signup and view all the answers
What is the key difference between a macro virus and a program virus?
What is the key difference between a macro virus and a program virus?
Signup and view all the answers
What is the intended target of a boot virus?
What is the intended target of a boot virus?
Signup and view all the answers
What action does a worm take advantage of in order to enter a system?
What action does a worm take advantage of in order to enter a system?
Signup and view all the answers
What does a resident virus do each time the computer is turned on?
What does a resident virus do each time the computer is turned on?
Signup and view all the answers
What type of program conceals its true purpose and performs harmful actions?
What type of program conceals its true purpose and performs harmful actions?
Signup and view all the answers
How does a virus spread to other computers?
How does a virus spread to other computers?
Signup and view all the answers
What is the main purpose of a worm's payload?
What is the main purpose of a worm's payload?
Signup and view all the answers
What is the target of a boot virus?
What is the target of a boot virus?
Signup and view all the answers