Security+ Chapter 1: Introduction to Security Quiz

SecureRomanesque avatar
SecureRomanesque
·
·
Download

Start Quiz

Study Flashcards

34 Questions

There is a simple solution to securing information. True or False?

False

Smartphones are not a new target for security attacks. True or False?

False

One of the difficulties in defending against attacks is decreased speed of attacks. True or False?

False

One of the difficulties in defending against attacks is delays in patching. True or False?

True

User confusion is not a difficulty in defending against attacks. True or False?

False

Universally connected devices do not pose any difficulties in defending against attacks. True or False?

False

The Slammer worm infected 75,000 computers in the first 11 minutes of its release.

True

Slammer infections doubled every 8.5 seconds.

True

Slammer scanned 55 million computers per second.

True

Attackers today use common Internet tools and protocols to send malicious data and commands.

True

Day zero attacks occur when an attacker discovers and exploits previously unknown flaws.

True

Vendors are overwhelmed trying to keep pace with updating their products against attacks.

True

Distributed attacks involve many attackers against one, making it difficult to stop the attack by identifying and blocking the source.

True

Information security completely prevents attacks and guarantees that a system is totally secure.

False

Before defense is possible, one must understand what information security is, why it is important, and who the attackers are.

True

Preventive measures, rapid response, and preemptive attacks are steps to protect person or property from harm in information security.

True

What is the primary objective of malware?

To conceal the malware's malicious actions

Which type of malware is designed to bring profit from its actions?

Malware for Profit

What is the main characteristic of social engineering attacks?

They exploit human psychology and behavior

Which type of malware enters a computer system without the owner's knowledge or consent?

Viruses

What is the significance of concealing malware's malicious actions?

To operate without the owner's knowledge or consent

Which statement best describes the purpose of infecting malware?

To infect a computer system

What is a virus's main purpose when it infects a file or program?

To replicate itself and spread to other files or programs

What is the distinguishing feature of a worm compared to a virus?

Worms automatically spread to other computers, while viruses rely on user action to spread

What does a Trojan horse typically involve?

Performing the activity it promises while secretly collecting information for an attacker

What is the primary purpose of rootkits used by attackers?

To hide the attacker's actions or presence

What is the key difference between a macro virus and a program virus?

Macro viruses execute scripts, while program viruses infect executable files

What is the intended target of a boot virus?

The Master Boot Record (MBR) of a hard disk drive

What action does a worm take advantage of in order to enter a system?

Exploiting a vulnerability in an application or an operating system

What does a resident virus do each time the computer is turned on?

Infect files opened by the user or operating system

What type of program conceals its true purpose and performs harmful actions?

.exe files that pretend to be performing one activity but actually do something else

How does a virus spread to other computers?

By exploiting vulnerabilities in applications or operating systems, allowing it to enter other systems

What is the main purpose of a worm's payload?

To activate malicious code designed to harm infected systems

What is the target of a boot virus?

The Master Boot Record (MBR) of a hard disk drive

Test your knowledge about the challenges of securing information, types of attackers, basic steps of an attack, and the five basic principles of defense. This quiz is based on the 'Security+ Guide to Network Security Fundamentals, Fourth Edition' Chapter 1.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser