Countries would engage in cyberwar - Answer Both before a physical attack and after a
physical attack
Neither before a physical attack nor after a physical attack
The definition of spam is "unsolicited commercial e-mail." - Answer true
In ________, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest. - Answer extortion
Under current U.S. federal laws, if a company allows personal information to be stolen,
it may be subject to government fines. - Answer true
Downloading pornography can lead to sexual harassment lawsuits. - Answer true
Cyberwar consists of computer-based attacks conducted by ________. - Answer
national goverments
________ can spread through e-mail attachments. - Answer both viruses and worms
A program that gives the attacker remote access control of your computer is specifically
called a ________. - Answer RAT
In pretexting, an attacker calls claiming to be a certain person in order to ask for private
information about that person. - Answer true
A(n) ________ attack requires a victim host to prepare for many connections, using up
resources until the computer can no longer serve legitimate users. (Choose the most
specific choice.) - Answer SYN Flooding
Mobile code usually is delivered through ________. - Answer webpages
Most cookies are dangerous. - Answer false
If a company wishes to prosecute people or companies that steal its trade secrets, it
must take ________ precautions to protect those trade secrets. - Answer reasonable
Which of the following are types of countermeasures? - Answer all of these
About how long was the Sony PlayStation Network offline as a result of the cyber
attacks? - Answer 3 weeks
Some ________ can jump directly between computers without human intervention. -
Answer worms
, The attack method used in the Sony data breaches was ________. - Answer SQL
injection
Carding is more serious than identity theft. - Answer false
________ is a generic term for "evil software." - Answer malware
When a threat succeeds in causing harm to a business, this is a(n) ________. - Answer
breach
Botnets usually have multiple owners over time. - Answer true
Which of the following are ways that trade secret espionage occur? - Answer all of
these
Another name for safeguard is ________. - Answer countermeasure
Sending packets with false IP source addresses is called ________. - Answer IP
address spoofing
Most countermeasure controls are preventative controls. - Answer true
A ________ is a type of fix for vulnerabilities. - Answer Both work-around and service
pack
A private key/public key pair is usually created by the ________. - Answer client
________ is necessary to protect the host against attacks. - Answer Host hardening
UNIX offers ________ directory and file permissions than (as) Windows. - Answer fewer
In the context of PKI, ________ is the process of accepting public keys and providing
new digital certificates to the users. - Answer provisioning
Inheritance ________ labor costs in assigning permissions. - Answer reduces
A ________ is a small device that plugs into a standard computer port to identify the
owner. - Answer USB token
________ often get their authentication information from ________. - Answer Central
authentication servers, directory servers
In Kerberos, the ________ is the supplicant's proof that it has already authenticated
itself with the Kerberos Server. - Answer ticket granting ticket