Upgrade to remove ads
Terms in this set (15)
the main goal of a cyberattack is to affect one or more IT assets.
Which of the following best describes intellectual property?
The unique knowledge that a business possesses.
Which of the following terms best describe a person with very little skill?
A _____ is a software tool that captures traffic as it travels.
Sniffer or Packet Sniffer
Which type of attacks result in legitimate users not having access to a system resource?
Denial of Service(DoS)
A SYN flood attack floods a target with invalid network packets.
WHich type of document defines unacceptable computer behavior?
AUP(Acceptable Use Policy)
Which of the following steps can best protect your computer from worms?
Installing antimalware software
A wardialer is a legacy tool no longer in use.
A dictionary attack is a simple attack that primarily relies on users making poor password choices.
Which type of attack involves capturing data packets from a network and transmitting them later to produce an unauthorized effect?
A(n) ____ is any action that could damage an asset.
A(n) ____ is any weakness that makes it possible for a threat to cause harm to a computer or network.
Which type of malware is a self-Contained program that replicates and sends copies to other computers, generally across a network?
Which group is responsible for responding to any reported cyberattack?
Incident response team
THIS SET IS OFTEN IN FOLDERS WITH...
Chapter 1 Review Questions
YOU MIGHT ALSO LIKE...
CSS1005: CHAPTER 3
Domain 3 Threats and Vulnerabilities (Multiple Cho…
4.0 Network Attacks
security preaux (Ch 5) (5.1.7, 5.2.9, 5.3.8, 5.4.5)
OTHER SETS BY THIS CREATOR
OTHER QUIZLET SETS
IST 323 Final part 2
chapter 1 ITSY
ISM Ch 10