Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Answer all for a thumbs up! QUESTION 1 Because people inside an organization generally have more detailed knowledge of the IT infrastructure than outsiders do,

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedAnswer all for a thumbs up!

QUESTION 1 Because people inside an organization generally have more detailed knowledge of the IT infrastructure than outsiders do, they can place logic bombs more easily. True False QUESTION 2 Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communications protocols. True False QUESTION 3 Attacks against confidentiality and privacy, data integrity, and availability of services are all ways malicious code can threaten businesses. True False QUESTION 4 The term "web defacement" refers to someone gaining unauthorized access to a web server and altering the index page of a site on the server. True False QUESTION 5 A worm is a self-contained program that has to trick users into running it. O True False QUESTION 6 Spyware does NOT use cookies. True O False QUESTION 7 The function of homepage hijacking is to change a browser's homepage to point to the attacker's site. True False QUESTION 8 Retro viruses counter the ability of antivirus programs to detect changes in infected files. True False QUESTION 9 It is common for rootkits to modify parts of the operating system to conceal traces of their presence. True False QUESTION 10 A computer virus is an executable program that attaches to, or infects, other executable programs. O True False QUESTION 11 What ISO security standard can help guide the creation of an organization's security policy? 12333 17259 27002 42053 QUESTION 12 What type of malicious software allows an attacker to remotely control a compromised computer? Worm Polymorphic virus Remote Access Tool (RAT) Armored virus QUESTION 13 Adam discovers a virus on his system that is using encryption to modify itself. The virus escapes detection by signature-based antivirus software. What type of virus has he discovered? Polymorphic virus Stealth virus Cross-platform virus Multipartite virus QUESTION 14 The CEO of Kelly's company recently fell victim to an attack. The attackers sent the CEO an email informing him that his company was being sued and he needed to view a subpoena at a court website. When visiting the website, malicious code was downloaded onto the CEO's computer. What type of attack took place? Spear phishing Pharming Adware Command injection QUESTION 15 Which type of virus targets computer hardware and software startup functions? Hardware infector System infector File infector Data infector QUESTION 16 Larry recently viewed an auction listing on a website. As a result, his computer executed code that popped up a window that asked for his password. What type of attack has Larry likely encountered? SQL injection Command injection XML injection O Cross-site scripting (XSS) QUESTION 17 Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keystrokes to a third party. What information security property is this malware attacking? Integrity Availability Accounting Confidentiality QUESTION 18 What is NOT a typical sign of virus activity on a system? Unexplained decrease in available disk space Unexpected error messages Unexpected power failures O Sudden sluggishness of applications QUESTION 19 Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block? Hypertext Transfer Protocol (HTTP) Transmission Control Protocol (TCP) Internet Control Message Protocol (ICMP) User Datagram Protocol (UDP) QUESTION 20 Bob is developing a web application that depends upon a database backend. What type of attack could a malicious individual use to send commands through his web application to the database? Cross-site scripting (XSS) XML injection SQL injection O LDAP injection

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Database Systems With Internet And Java Applications

Authors: Greg Riccardi

1st Edition

020161247X, 978-0201612479

More Books

Students also viewed these Databases questions