Quiz 1

.docx

School

Lamar University *

*We aren’t endorsed by this school

Course

MISY-532

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

6

Uploaded by minhaj90

Quiz 1 Test Content 1. Question 1 1.25 Points The ___structured_________________threat category contains threats that are characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and possibly corruption of, or collusion with, insiders. structured o Blank 1 2. Question 2 1.25 Points Who is considered to be the ultimate insider, with his name being synonymous with the insider threat issue? o Robert Morris o Ean o sddward Snowden o Kevin Mitnick o Vladimir Levin Ans : Edward Snoden 3. Question 3 1.25 Points Which Internet worm created infected systems that were part of what is known as a bot network (or botnet) and could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users? o Slammer o Code Red o Ans: confiker o “ILOVEYOU” o An 4.
Question 4 1.25 Points Which Internet criminal is famous for conducting his attacks using a number of different “tools” and techniques, including social engineering, sniffers, and cloned cellular telephones? o Robert Morris o Kevin Mitnick o Vladimir Levin o David Smith o Ans: kevin Mitnick 5. Question 5 1.25 Points How did the Code Red worm spread? o It exploited a buffer-overflow vulnerability in computers running Microsoft SQL Server or SQL Server Desktop Engine. o It collected key-strokes, screenshots, and network traffic from open ports. o It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month. o It entered through the victim’s Outlook address book software and then replicated itself by sending infected emails to the first 50 contacts. o Ans: It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month. 6. Question 6 1.25 Points _______Critical_____________ infrastructures are those whose loss would have severe repercussions on the nation. Critical o Blank 1 7. Question 7 1.25 Points Which statement applies to viruses? o They typically are ahighly visible once released. o They are the best tool to use in highly structured attacks.
o They are the best tool to use in attacks where secrecy is vital. o They are targeted at a specific organization. Ans : They typically are highly visible once released. o 8. Question 8 1.25 Points Which suspected nation-state malware platform poses interest because of its stealth, its complexity, and its ability to hide its command and control network from investigators? o Energetic Bear o The Dragonfly group o Regin o LulzSec o Ans: Regin 9. Question 9 1.25 Points Which term describes a category of attacks that generally are conducted over short periods of time (lasting at most a few months), involve a smaller number of individuals, have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders? o Unstructured threat category o Structured threat category o Highly structured threat category o Critical infrastructure category o Ans: Unstructured threat category 10. Question 10 1.25 Points In 2014, on how many different threat actors, including criminals, hactivists, state-sponsored groups, and nation states, did CrowdStrike report? o 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help