IST 462 Test 1 Part 2NAME:
True/False
Indicate whether the statement is true or false.
___T_1.Although it is sometimes thought to be immune to attacks, Apple has shown that it too can be the victim of attackers and encourages its users to be more secure.
_T___2.In a general sense, security is defined as a state of freedom from danger or risk.
__F__3.The loss of employee productivity is the single largest cause of financial loss due to a security breach.
__F__4.As a reaction to a rash of corporate fraud, the Gramm-Leach-Bliley Act (GLBA) is an attempt to fight corporate corruption.
__T__5.Utility companies, telecommunications, and financial services are considered prime targets of cyberterrorists because they can significantly disrupt business and personal activities by destroying a few targets.
__F__6.Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.
__T__7.Removing a rootkit from an infected computer is extremely difficult.
__T__8.Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
___T9.SAN can be shared between servers but cannot be extended over geographical distances.
__F__10.Because NAS operates at the file system level, NAS security cannot be implemented through the standard operating system security features.
__T__11.One of the most important steps in hardening an operating system to resist attacks is to apply updates.
__F__12.The “return address” of a program is the only element that can be altered through a buffer overflow attack.
___T_13.JavaScript residesinside HTML documents.
__T__14.Signed Java applets by default run in the sandbox and are restricted regarding what they can do.
__T__15.Like Java applets, ActiveX controls also run in a sandbox.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
_B___16.According to the 2007 FBI Computer Crime and Security Survey, the loss due to the theft of confidential data for 494 respondents was approximately ____.
a. / $1 million / c. / $50 millionb. / $10 million / d. / $100 million
__A__17.The _____ act is designed to broaden the surveillance of law enforcement agencies so they can detect and suppress terrorism.
a. / Gramm-Leach-Blileyb. / Sarbanes-Oxley
c. / California Database Security Breach
d. / USA Patriot
__C__18.Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as ____.
a. / spam / c. / cybercrimeb. / phishing / d. / cyberterrorism
_A___19.A security ____ focuses on the administration and management of plans, policies, and people.
a. / manager / c. / auditorb. / engineer / d. / inspector
___D_20.A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.
a. / 10 to 14 / c. / 13 to 14b. / 12 to 15 / d. / 14 to 16
__B__21.A ____ virus can interrupt almost any function executed by the computer operating system and alter it for its own malicious purposes.
a. / companion / c. / residentb. / file infector / d. / Boot
___D_22.A ____ virus infects the Master Boot Record of a hard disk drive.
a. / file infector / c. / residentb. / companion / d. / Boot
__C__23.A ____ is a program advertised as performing one activity but actually does something else.
a. / script / c. / Trojanb. / virus / d. / Worm
___B_24.A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
a. / Trojan / c. / macro virusb. / logic bomb / d. / metamorphic virus
__A__25.____ involves horizontally separating words, although it is still readable by the human eye.
a. / Word splitting / c. / Geometric varianceb. / GIF layering / d. / Layer variance
___A_26.____ uses “speckling” and different colors so that no two spam e-mails appear to be the same.
a. / GIF layering / c. / Word splittingb. / Geometric variance / d. / Layer variance
_B___27.____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.
a. / Expansion / c. / Load balancingb. / Virtualization / d. / Distribution
__D__28.One type of virtualization in which an entire operating system environment is simulated is known as ____ virtualization.
a. / NOS / c. / operating systemb. / guest / d. / Host
_A___29.____ technology enables a virtual machine to be moved to a different physical computer with no impact to the users.
a. / Live migration / c. / Operating system virtualizationb. / Load balancing / d. / Server virtualization
__A__30.Instead of the Web server asking the user for the same information each time she visits that site, the server can store that user-specific information in a file on the user’s local computer and then retrieve it later. This file is called a(n) ____.
a. / cookie / c. / ActiveX controlb. / bug / d. / Script
_D___31.A(n) ____ is a computer programming language that is typically interpreted into a language the computer can understand.
a. / ActiveX control / c. / Shellb. / cookie / d. / scripting language
___A_32.SMTP servers can forward e-mail sent from an e-mail client to a remote domain. This is known as ____.
a. / SMTP relay / c. / Spamb. / IMAP / d. / Spam relay
__B__33.If SMTP relay is not controlled, an attacker can use it to forward thousands of spam e-mail messages. An uncontrolled SMTP relay is known as a(n) ____.
a. / IMAP open relay / c. / open POPb. / SMTP open relay / d. / open IMAP