Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Before you can formulate a defense for a network you need what?
A clear picture of the dangers to be defended against
What is spyware?
Any software that monitors your system
What is a sneaker?
A person who hacks a system to test its vulnerabilities
What is malware?
Software that has some malicious purpose
What is war-driving?
Driving looking for wireless networks to hack
According to a recent survey of 223 computer professionals prepared by the Computer Security
Institute, which of the following was cited as an issue by more of the respondents?
Employee abuse
What is a NIC?
Network Interface Card
What protocol is used to send email, and on what port does it work?
SMTP, port 25
What protocol is used for web pages, and what port does it work on?
HTTP, port 80
The point where the backbones of the Internet connect is called what?
Network access points
What ranges for the first number in an IP address are for A-E?
A: 0-126, B: 128 - 191, C: 192 - 223, D: 224 - 247, E: 248 - 255
Which US government agency created the distributed network that formed the basis for the
Internet?
Advanced Research Projects Agency (ARPA)
Which of the following was one of the three universities involved in the original distributed
network setup by a government agency?
Berkeley
Vince Cerf created:
TCP?
Which utility gives you information about your machine's network configuration?
IPConfig
A unique hexadecimal number that identifies your network card is called what?
MAC Address
Submitting a fake but very high bid to deter other bidders is referred to as what?
Bid shielding
According to the U.S. Department of Justice, identity theft is usually motivated by what?
Economic gain
What is a cookie?
A small file made that contains data and then is stored on your computer
If you are a victim of cyber stalking, what should you do to assist the police?
Keep electronic and printed copies of all harassing communications
What are three methods for protecting against SYN flood attacks?
SYN cookies, RST cookies, and stack tweaking
What type of defense depends on changing the server so that unfinished handshaking times
out sooner?
Stack tweaking
What can you do with your firewall to defend against DoS attacks?
Block all incoming ICMP packets
Why will protecting against Trojan horse attacks reduce DoS attacks?
Because many denial of service attacks are conducted by using a Trojan horse to get an
unsuspecting machine to execute the DoS
What factor about the Sobig virus made it most intriguing to security experts?
It spread in multiple ways
What was most interesting to security experts about the Mimail virus?
It grabbed email addresses from documents on the hard drive
What can you do with a firewall to help protect against virus attack?
Shut down all unneeded ports
This virus appears to be benign software but secretly downloading a virus or some other type of
malware onto your computer from within.
Trojan Horse
Which of the following is not one of the three major classes of threats?
Online auction fraud
The most desirable approach to security is one that is which of the following?
Layered and dynamic
Which of the following is the best definition of the term sensitive information?
Any information that has impact on national security