Solved
4) If an attacker breaks into a corporate database and deletes critical files, this is a attack against
the ________ security goal.
A) integrity
B) confidentiality
C) Both A and B
D) Neither A nor B A
6) When a threat succeeds in causing harm to a business, this is called a ________.
A) breach
B) compromise
C) incident
D) All of the above D
9) Which of the following is a type of countermeasure?
A) Detective
B) Corrective
C) Both A and B
D) Neither A nor B C
12) Detective countermeasures keep attacks from succeeding. FALSE
,32) When considering penalties for hacking, motivation is irrelevant. TRUE
35) The terms "intellectual property" and "trade secret" are synonymous. FALSE
41) ________ are programs that attach themselves to legitimate programs.
A) Viruses
B) Worms
C) Both A and B
D) Neither A nor B A
52) Rootkits replace legitimate programs and are considered a deeper threat than a set of
programs called Trojan horses. FALSE
53) Which type of program can hide itself from normal inspection and detection?
A) Trojan horse
B) Stealth Trojan
C) Spyware
D) Rootkit D
54) Mobile code usually is delivered through ________.
A) webpages
, B) e-mail
C) directly propagating worms
D) All of the above A
65) In response to a chain of attack, victims can often trace the attack back to the final attack
computer. TRUE
68) Attackers cannot use IP address spoofing in port scanning attack packets. TRUE
69) The primary purpose for attackers to send port scanning probes to hosts is to identify which
ports are open. FALSE
70) To obtain IP addresses through reconnaissance, an attacker can use ________.
A) IP address spoofing
B) a chain of attack computers
C) Both A and B
D) Neither A nor B B
81) One of the two characterizations of expert hackers is ________.
A) automated attack tools
B) dogged persistence
C) Both A and B
D) Neither A nor B B