Podcast
Questions and Answers
There is a simple solution to securing information. True or False?
There is a simple solution to securing information. True or False?
False (B)
Smartphones are not a new target for security attacks. True or False?
Smartphones are not a new target for security attacks. True or False?
False (B)
One of the difficulties in defending against attacks is decreased speed of attacks. True or False?
One of the difficulties in defending against attacks is decreased speed of attacks. True or False?
False (B)
One of the difficulties in defending against attacks is delays in patching. True or False?
One of the difficulties in defending against attacks is delays in patching. True or False?
User confusion is not a difficulty in defending against attacks. True or False?
User confusion is not a difficulty in defending against attacks. True or False?
Universally connected devices do not pose any difficulties in defending against attacks. True or False?
Universally connected devices do not pose any difficulties in defending against attacks. True or False?
The Slammer worm infected 75,000 computers in the first 11 minutes of its release.
The Slammer worm infected 75,000 computers in the first 11 minutes of its release.
Slammer infections doubled every 8.5 seconds.
Slammer infections doubled every 8.5 seconds.
Slammer scanned 55 million computers per second.
Slammer scanned 55 million computers per second.
Attackers today use common Internet tools and protocols to send malicious data and commands.
Attackers today use common Internet tools and protocols to send malicious data and commands.
Day zero attacks occur when an attacker discovers and exploits previously unknown flaws.
Day zero attacks occur when an attacker discovers and exploits previously unknown flaws.
Vendors are overwhelmed trying to keep pace with updating their products against attacks.
Vendors are overwhelmed trying to keep pace with updating their products against attacks.
Distributed attacks involve many attackers against one, making it difficult to stop the attack by identifying and blocking the source.
Distributed attacks involve many attackers against one, making it difficult to stop the attack by identifying and blocking the source.
Information security completely prevents attacks and guarantees that a system is totally secure.
Information security completely prevents attacks and guarantees that a system is totally secure.
Before defense is possible, one must understand what information security is, why it is important, and who the attackers are.
Before defense is possible, one must understand what information security is, why it is important, and who the attackers are.
Preventive measures, rapid response, and preemptive attacks are steps to protect person or property from harm in information security.
Preventive measures, rapid response, and preemptive attacks are steps to protect person or property from harm in information security.
What is the primary objective of malware?
What is the primary objective of malware?
Which type of malware is designed to bring profit from its actions?
Which type of malware is designed to bring profit from its actions?
What is the main characteristic of social engineering attacks?
What is the main characteristic of social engineering attacks?
Which type of malware enters a computer system without the owner's knowledge or consent?
Which type of malware enters a computer system without the owner's knowledge or consent?
What is the significance of concealing malware's malicious actions?
What is the significance of concealing malware's malicious actions?
Which statement best describes the purpose of infecting malware?
Which statement best describes the purpose of infecting malware?
What is a virus's main purpose when it infects a file or program?
What is a virus's main purpose when it infects a file or program?
What is the distinguishing feature of a worm compared to a virus?
What is the distinguishing feature of a worm compared to a virus?
What does a Trojan horse typically involve?
What does a Trojan horse typically involve?
What is the primary purpose of rootkits used by attackers?
What is the primary purpose of rootkits used by attackers?
What is the key difference between a macro virus and a program virus?
What is the key difference between a macro virus and a program virus?
What is the intended target of a boot virus?
What is the intended target of a boot virus?
What action does a worm take advantage of in order to enter a system?
What action does a worm take advantage of in order to enter a system?
What does a resident virus do each time the computer is turned on?
What does a resident virus do each time the computer is turned on?
What type of program conceals its true purpose and performs harmful actions?
What type of program conceals its true purpose and performs harmful actions?
How does a virus spread to other computers?
How does a virus spread to other computers?
What is the main purpose of a worm's payload?
What is the main purpose of a worm's payload?
What is the target of a boot virus?
What is the target of a boot virus?