Shared Flashcard Set

Details

Security ch 15-16
Security ch 15-16
27
Computer Science
Undergraduate 1
09/28/2013

Additional Computer Science Flashcards

 


 

Cards

Term
Making data look like it has come from a different source is called
Definition
Spoofing
Term
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
Definition
false
Term
The two main places to filter spam are ________________.
Definition
a. at the host itself and the server
Term
Johnny received a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor was installed on his computer without his knowledge. What kind of an attack is this?
Definition
Trojan
Term
SYN flooding is an example of a
Definition
b. Denial of service attack Correct
Term
S/MIME is a secure implementation of the MIME protocol.
Definition
true
Term
What TCP port does SMTP use?
Definition
25
Term
A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.
Definition
network sniffer
Term
What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers?
Definition
Man-in-the-middle attack
Term
One of the largest security problems with IM programs is ___________.
Definition
the lack of support for encryption
Term
What is the process of assessing the state of an organization's security compared against an established standard called?
Definition
Auditing
Term
The trends show that e-mail hoaxes are being thwarted due to new technology.
Definition
false
Term
A syn flood is type of spam that floods the inbox with pornographic material.
Definition
false
Term
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.
Definition
Social engineering
Term
Most instant messaging programs natively support encryption.
Definition
false
Term
Which of the following is NOT one of the three primary e-mail protocols?
Definition
SNMP
Term
Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them.
Definition
TRUE
Term
All of the following techniques help to secure IM communications EXCEPT which of the following?
Definition
Using a different user name
Term
E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it.
Definition
TRUE
Term
A computer system is attacked for one of two reasons: it is specifically targeted by the attacker, or it is a target of opportunity.
Definition
TRUE
Term
What is software that records and reports activities of the user (typically without their knowledge) called?
Definition
SPYWARE
Term
What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers?
Definition
Man-in-the-middle attack
Term
Viruses can exist independent of a file, whereas worms require a file to infect.
Definition
FALSE
Term
Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.
Definition
FALSE
Term
Unsolicited commercial e-mail is known as __________.
Definition
SPAM
Term
An attack that takes advantage of bugs or weaknesses in the software is referred to as what?
Definition
Software exploitation
Term
What TCP port does IMAP use?
Definition
110
Supporting users have an ad free experience!