Term
| Making data look like it has come from a different source is called |
|
Definition
|
|
Term
| Targeted attacks are easier and take less time and effort than attacks on targets of opportunity. |
|
Definition
|
|
Term
| The two main places to filter spam are ________________. |
|
Definition
| a. at the host itself and the server |
|
|
Term
| Johnny received a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor was installed on his computer without his knowledge. What kind of an attack is this? |
|
Definition
|
|
Term
| SYN flooding is an example of a |
|
Definition
| b. Denial of service attack Correct |
|
|
Term
| S/MIME is a secure implementation of the MIME protocol. |
|
Definition
|
|
Term
| What TCP port does SMTP use? |
|
Definition
|
|
Term
| A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media. |
|
Definition
|
|
Term
| What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers? |
|
Definition
|
|
Term
| One of the largest security problems with IM programs is ___________. |
|
Definition
| the lack of support for encryption |
|
|
Term
| What is the process of assessing the state of an organization's security compared against an established standard called? |
|
Definition
|
|
Term
| The trends show that e-mail hoaxes are being thwarted due to new technology. |
|
Definition
|
|
Term
| A syn flood is type of spam that floods the inbox with pornographic material. |
|
Definition
|
|
Term
| _____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker. |
|
Definition
|
|
Term
| Most instant messaging programs natively support encryption. |
|
Definition
|
|
Term
| Which of the following is NOT one of the three primary e-mail protocols? |
|
Definition
|
|
Term
| Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them. |
|
Definition
|
|
Term
| All of the following techniques help to secure IM communications EXCEPT which of the following? |
|
Definition
| Using a different user name |
|
|
Term
| E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it. |
|
Definition
|
|
Term
| A computer system is attacked for one of two reasons: it is specifically targeted by the attacker, or it is a target of opportunity. |
|
Definition
|
|
Term
| What is software that records and reports activities of the user (typically without their knowledge) called? |
|
Definition
|
|
Term
| What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers? |
|
Definition
|
|
Term
| Viruses can exist independent of a file, whereas worms require a file to infect. |
|
Definition
|
|
Term
| Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan. |
|
Definition
|
|
Term
| Unsolicited commercial e-mail is known as __________. |
|
Definition
|
|
Term
| An attack that takes advantage of bugs or weaknesses in the software is referred to as what? |
|
Definition
|
|
Term
| What TCP port does IMAP use? |
|
Definition
|
|