| Term 
 
        | Making data look like it has come from a different source is called |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Targeted attacks are easier and take less time and effort than attacks on targets of opportunity. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The two main places to filter spam are ________________. |  | Definition 
 
        | a. at the host itself and the server |  | 
        |  | 
        
        | Term 
 
        | Johnny received a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor was installed on his computer without his knowledge. What kind of an attack is this? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | SYN flooding is an example of a |  | Definition 
 
        | b. Denial of service attack Correct |  | 
        |  | 
        
        | Term 
 
        | S/MIME is a secure implementation of the MIME protocol. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What TCP port does SMTP use? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A _____________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | One of the largest security problems with IM programs is ___________. |  | Definition 
 
        | the lack of support for encryption |  | 
        |  | 
        
        | Term 
 
        | What is the process of assessing the state of an organization's security compared against an established standard called? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The trends show that e-mail hoaxes are being thwarted due to new technology. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A syn flood is type of spam that floods the inbox with pornographic material. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Most instant messaging programs natively support encryption. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is NOT one of the three primary e-mail protocols? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | All of the following techniques help to secure IM communications EXCEPT which of the following? |  | Definition 
 
        | Using a different user name |  | 
        |  | 
        
        | Term 
 
        | E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A computer system is attacked for one of two reasons: it is specifically targeted by the attacker, or it is a target of opportunity. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is software that records and reports activities of the user (typically without their knowledge) called? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is it called when an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Viruses can exist independent of a file, whereas worms require a file to infect. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Unsolicited commercial e-mail is known as __________. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | An attack that takes advantage of bugs or weaknesses in the software is referred to as what? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What TCP port does IMAP use? |  | Definition 
 | 
        |  |