Term
Making data look like it has come from a different source is called |
|
Definition
|
|
Term
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity. |
|
Definition
|
|
Term
The two main places to filter spam are ________________. |
|
Definition
a. at the host itself and the server |
|
|
Term
Johnny received a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor was installed on his computer without his knowledge. What kind of an attack is this? |
|
Definition
|
|
Term
SYN flooding is an example of a |
|
Definition
b. Denial of service attack Correct |
|
|
Term
S/MIME is a secure implementation of the MIME protocol. |
|
Definition
|
|
Term
What TCP port does SMTP use? |
|
Definition
|
|
Term
A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media. |
|
Definition
|
|
Term
What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers? |
|
Definition
|
|
Term
One of the largest security problems with IM programs is ___________. |
|
Definition
the lack of support for encryption |
|
|
Term
What is the process of assessing the state of an organization's security compared against an established standard called? |
|
Definition
|
|
Term
The trends show that e-mail hoaxes are being thwarted due to new technology. |
|
Definition
|
|
Term
A syn flood is type of spam that floods the inbox with pornographic material. |
|
Definition
|
|
Term
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker. |
|
Definition
|
|
Term
Most instant messaging programs natively support encryption. |
|
Definition
|
|
Term
Which of the following is NOT one of the three primary e-mail protocols? |
|
Definition
|
|
Term
Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them. |
|
Definition
|
|
Term
All of the following techniques help to secure IM communications EXCEPT which of the following? |
|
Definition
Using a different user name |
|
|
Term
E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it. |
|
Definition
|
|
Term
A computer system is attacked for one of two reasons: it is specifically targeted by the attacker, or it is a target of opportunity. |
|
Definition
|
|
Term
What is software that records and reports activities of the user (typically without their knowledge) called? |
|
Definition
|
|
Term
What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers? |
|
Definition
|
|
Term
Viruses can exist independent of a file, whereas worms require a file to infect. |
|
Definition
|
|
Term
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan. |
|
Definition
|
|
Term
Unsolicited commercial e-mail is known as __________. |
|
Definition
|
|
Term
An attack that takes advantage of bugs or weaknesses in the software is referred to as what? |
|
Definition
|
|
Term
What TCP port does IMAP use? |
|
Definition
|
|