Full file at

Test Item File
Revised September 2003

Business Computer and Network Security

Raymond R. Panko

Prentice-Hall, 2004

Chapter 1: A Framework

1-1.According to the CSI/FBI survey data for 2002, ____ percent of all firms responding had experienced at least one actual security breach.

*a.90%

b.70%

c.50%

d.30%

e.10%

1-2.The most prevalent threat today according to the CSI/FBI survey is _____.

a.system penetration (hacking)

b.employee theft

*c.viruses

d.denial-of-service attacks

e.theft of intellectual property

1-3.According to the CSI/FBI survey data for 2002, ____ percent of all firms responding had experienced at least one systems penetration security breach.

a.80%

b.60%

*c.40%

d.20%

e.10%

1-4.In most attack categories, dollar losses are growing more rapidly than the percentage of firms experiencing the attack according to the CSI/FBI surveys.

*a.True

b.False

1-5.Which of the following resulted in the highest dollar loss per firmexperiencing a breach according to the CSI/FBI survey?

*a.Theft of intellectual property (trade secrets)

b.System penetration (hacking)

c.Wiretapping

d.Viruses

e.Denial-of-service attacks

1-6.The relative amount of media coverage of various security threats is at least a good rough indicator of their relative importance.

a.True

*b.False

1-7.The Honeynet project showed that while Windows PC are not secure, LINUX PCs are safe.

a.True

*b.False

1-8.The SecurityFocus data indicates that while Microsoft Windows is attacked frequently, UNIX is rarely attacked.

a.True

*b.False

1-9.According to Riptech’s data, most attacks ______.

a.Are aimed at specific firms.

*b.Strike firms randomly.

1-10.Today’s security threat environment is a good basis for planning countermeasures to be implemented over the next three to five years.

a.True

*b.False

1-11.According to the book, the term “hacking” should be used as _____.

*a.intentionally accessing (using) a computer without authorization or beyond authorized permission.

b.a general name for a wide variety of attacks

1-12.Which of the following is illegal?

a.Writing viruses

*b.Releasing viruses

c.Both of the above.

d.Neither a. nor b.

1-13.Despite their derogatory name, script kiddies tend to have extensive attack skills.

a.True

*b.False

1-14.Script kiddies are dangerous because of _____

a.their attack skills

*b.their large numbers

c.Both of the above.

1-15.Espionage focuses on the theft of _____.

a.money

*b.intellectual property (trade secrets)

c.credit card numbers

d.identity

1-16.How will tomorrow’s threat environment be worse than today’s?

*a.If past trends continue, attacks will roughly double each year.

b.Attacks will focus more precisely on specific firms.

c.Security through obscurity will be ever more critical.

d.All of the above

1-17.Which group of attackers is dangerous because of their knowledge about and existing access to internal corporate systems?

a.Elite hackers

b.Script kiddies

c.Criminal attackers

*d.Employees

e.Spies

1-18.Although national governments and terrorist groups are dangerous, individual amateur attackers can only do a small amount of damage.

a.True

*b.False

1-19.Which of the following is one of the four main types of attacks in the book’s taxonomy?

a.Social engineering attacks

b.Dialog attacks

c.Penetration attacks

*d.All of the above

1-20.Eavesdropping is more difficult in _____.

*a.wired LANs

b.wireless LANs

1-21.I trick an employee into giving me proprietary information. I have used a(n) _____ attack.

a.site access

b.penetration

c.dialog

*d.social engineering

e.crafted

1-22.Which of the following is thwarted by authentication?

a.Eavesdropping

*b.Impersonation

c.Both of the above.

d.Neither a. nor b.

1-23.Cryptographic systems handle which of the following activities?

a.Authentication

b.Key exchange

*c.Both of the above.

d.Neither a. nor b.

1-24.Which of the following traditionally drop dangerous packets?

*a.firewalls

b.IDSs

c.Both of the above.

d.Neither a. nor b.

1-25.What probably is the single most important technical step that companies can take to improve their security?

a.Install firewalls

b.Install IDSs

*c.Install patches for known weaknesses

d.Install cryptographic systems

e.Install employee monitoring systems

1-26.Security is primarily a technology issue, so it makes sense to place it in the information systems department. (If any part of the statement is false, the statement is false.)

a.True

*b.False

1-27.Enforcing security policies through the sanctioning (punishment) of violators is _____.

*a.important

b.hurts more than it helps

1-28.An attacker has to break through several countermeasures to succeed; this is an example of _____.

a.asymmetrical warfare

*b.defense in depth

c.multilevel security

d.All of the above.

e.Both b. and c.

1-29.When an attack team hired by the firm attempts to penetrate the system, this is _____.

a.unethical

*b.a security audit

c.defense in depth

d.grey hat hacking

e.black hat hacking

1-30.In security, “CIA” stands for _____.

a.Central Intelligence Agency

b.Centralized information analysis

*b.Confidentiality, integrity, and availability

c.Central information assurance

d.Certified information assurance

1-31.Multiplying the dollar loss if a threat succeeds times the probability that a threat will succeed gives the _____.

a.priority rating

b.value of protection

*c.threat severity

d.sanction value

e.risk rating

1-32.Whether a countermeasure is worth implementing depends on the _____.

*a.value of protection

b.threat severity

c.sanction value

d.risk rating

1-33.Policies are set in the ____ phase.

*a.planning

b.protecting

c.responding

d.implementation

1-34.Reducing firewall mis-configurations is accomplished best with _____.

a.training

b.patching

c.updating

*d.security audits

1-35.If a firewall is set up properly, it can be ignored for a few months afterward.

a.True

*b.False

1-36.Setting up a CERT is best done after an incident has occurred, so that the proper mix of expertise can be brought to bear.

a.True

*b.False

1-37.In incident response, forensics is used primarily in _____.

*a.punishing offenders

b.system recovery

1-38.Is it easier to punish employees or external attackers?

a.External attackers

*b.Employees

1-39.What the military calls multilevel security is what the book calls defense in depth.

a.True

*b.False

1-40.Risk analysis is used to determine security spending _____.

*a.More in corporations than in the military.

b.More in the military than in corporations.

c.Both about equally.

Chapter 2: Access Control and Site Security

2-1.The password someone uses to check his or her e-mail normally is a reusable password.

*a.True

b.False

2-2.Cracking passwords on a remote computer, over a network, is _____.

a.often successful

*b.rarely successful

2-3.The equivalent to the root account in Microsoft Windows is _____.

a.root

*b.administrator

c.supervisor

d.su

e.sa

2-4.An attacker who cracks the root password and logs in as root can delete any file on a UNIX computer.

*a.True

b.False

2-5.Which of the following is better to use against common word passwords?

a.brute-force password guessing

*b.dictionary attacks

c.Both work about equally well.

2-6.Which of the following is better to use against GOOD passwords?

*a.brute-force password guessing

b.dictionary attacks

c.Both work about equally well.

2-7.Does “Amazon7” follow the rules for a good password?

a.Yes

*b.No

2-8.You are only using the letters of the alphabet, without case. Adding a single character to password length increases password cracking time by a factor of _____.

a.2

b.10

*c.26

d.52

e.100