Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Some default installations of the MS-SQL server did not have a password on the 'SA' system account. This allowed anyone with network access to the

Some default installations of the MS-SQL server did not have a password on the 'SA' system account. This allowed anyone with network access to the system to run random commands. When using this ______, the worm configures the 'Guest' account to allow file sharing and uploads itself to the target. It then uses the same MS-SQL password-less 'SA' account access to launch a remote copy of itself, thus spreading the infection.

a. Threat

b. Attack

c. Exploit

d. Vulnerability

 

2. Information only has value if it is correct. Information that has been tampered with could prove costly. For example, if you were sending an online money transfer for $100, but the information was tampered in such a way that you sent $10,000, it could prove to be very costly for you. This is an example of ______. Information only has value if the right people can access it at the right times. Denying access to information has become a very common attack nowadays. Almost every week, you can find news about high-profile websites being taken down by DDoS attacks. The primary aim of DDoS attacks is to deny users of the website access to the resources of the website. Such downtime can be very costly. This is an example of ______. Information has value, especially in today's world. Bank account statements, personal information, credit card numbers, trade secrets, and government documents. Everyone has information they wish to keep a secret. Protecting such information is a very major part of information security. This is an example of ______.

a. Integrity, availability, Confidentiality

b. Integrity, Confidentiality, availability

c. Confidentiality, availability, integrity

d. Confidentiality, integrity, availability

 

 3. During the Arab uprisings, a group of computer technicians has orchestrated a series of illegal "denial of service" attacks against the websites of the governments of Egypt and Tunisia in order to help the people. This is an example of__________

a. Hacktivism

b. Hacking

c. Cybercrime

d. Insider threat

 

4. A cybersecurity specialist is investigating a malware infection on the company's network. After looking through firewall logs, he finds out that Mr. Bake, the company's salesman, downloaded a malware while trying to illegally stream movies from the internet. The firewall logs provide _____________, which ensures Mr. Bake cannot deny his actions that led to the company's malware infection.

a. Non-repudiation

b. Availability

c. Integrity

d. Confidentiality

 

 

5. ________ threat actors do not have high technical knowledge and uses script and code that he finds to make an attack against your company. His motivation is that he wants to be seen as a famous hacker._______ threat actors are fairly highly sophisticated but have relatively low persistence. They Traditionally focused on credit card breaches but now ransomware is becoming their preferred method. ______ threat actors are easily the best-funded and most sophisticated of all threat actors. They often use advanced persistent threats (APTs), which is when a threat actor gets long-term control of a compromised system, continually looking for new data to steal.

a. Commodity threat, Organized crime, State-sponsored

b. Hacktivist, Organized crime, Commodity threat

c. Hacktivist, State-sponsored, Organized crime

d. Organized crime, Hacktivist, State-sponsored

 

 

6. Not changing the default password on a router is a ______; someone possibly taking control of your router by using the default password is the ______.

a. Attack, Vulnerability

b. Exploit, Vulnerability

c. Vulnerability, Threat

d. Vulnerability, Attack

 

Step by Step Solution

There are 3 Steps involved in it

Step: 1

The detailed answer for the above question is provided below 1 The correct option is c Exploit The s... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Information Systems

Authors: Marshall B. Romney, Paul J. Steinbart

13th edition

133428532, 978-0133428537

More Books

Students also viewed these Computer Network questions

Question

Why has the PCM sampling time been set at 125 sec?

Answered: 1 week ago