What hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network?

Complete loss of power for a moment is known as a(n) ____.

1. brownout   2. sag   3. blackout   4. fault

Packet

kiddies

use automated exploits to engage in distributed denial-of-service attacks.

One form of e-mail attack that is also a DoS is called a mail

spoof

, in which an attacker routes large quantities of e-mail to the target.

The term

phreaker

is now commonly associated with an individual who “cracks” or removes software protection that is designed to prevent unauthorized duplication.

The shoulder

looking

technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance.

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving ____.

1. urban legends   2. hoaxes  3. false alarms   4. power faults

A firewall is a device that keeps certain kinds of network traffic out of a private network.

Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

1. security   2. trespass  3. bypass   4. nature

Deliberate software attacks are referred to as ____.

1. malicious code   2. All of the above  3. malware   4. malicious software

An act of theft performed by a hacker falls into the category of deliberate acts of theft, but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of forces of nature.

distributed denial-of-service

A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

1. distributed denial-of-service  2. virus   3. spam   4. denial-of-service

A(n)

cookie

could allow an attacker to collect personal information about visits to Internet Web sites.

There are generally two skill levels among hackers: expert and ____.

1. journeyman   2. novice  3. packet monkey   4. professional

A worm requires that another program is running before it can begin functioning.

Which of the following is an example of a Trojan horse program?

1. Happy99.exe  2. Netsky   3. Klez   4. MyDoom

Sniffers often work on TCP/IP networks, where they’re sometimes called

packet

sniffers.

When voltage levels

surge

(experience a momentary increase), the extra voltage can severely damage or destroy equipment.

Expert hackers are extremely talented individuals who usually have lots of time and energy to devote to attempting to break into other people’s information systems.

Information security safeguards the technology assets in use at the organization.

In a(n) ____ attack, the attacker sends a large number of connection or information requests to a target.

A mail bomb is a form of DoS.

Information security safeguards the technology assets in use at the organization.

One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.

1. phvist   2. hacktivist  3. cyberhack   4. hackcyber

The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

1. FTP   2. HTTP   3. WWW   4. TCP

A firewall is a device that keeps certain kinds of network traffic out of a private network.

A worm can deposit copies of itself onto all Web servers that the infected system can write to, so that users who subsequently visit those sites become infected.

A sniffer program shows all the data on an unswitched network segment by including unencrypted passwords and the data inside files.

____ are software programs that hide their true nature, and reveal their designed behavior only when activated.

1. Trojan horses  2. Viruses   3. Worms   4. Spam

Cyberterrorists

hack systems to conduct terrorist activities through network or Internet pathways.

The

malicious

code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.

____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

1. Drones   2. Helpers   3. Zombies  4. Servants

The

macro

virus infects the key operating system files located in a computer’s boot sector.

Sniffers often work on TCP/IP networks, where they’re sometimes called

packet

sniffers.

“4-1-9” fraud is an example of a(n) ____ attack.

1. social engineering  2. virus   3. spam   4. worm

When voltage levels

surge

(experience a momentary increase), the extra voltage can severely damage or destroy equipment.

With the theft of electronic information, the evidence of a crime is readily apparent.