INMT 441 MODULE 1 TEST QUESTIONS WITH ALL CORRECT ANSWERS GRADED A+
3 views 0 purchase
Course
INMT 441
Institution
INMT 441
INMT 441 MODULE 1 TEST QUESTIONS WITH ALL CORRECT ANSWERS GRADED A+
Trojan (software attack) - Answer--an executable program that masquerades as performing a benign activity but also does something malicious
-optimizer, calendar, online game, video capture, etc.
Bot (software attack) - Answer...
INMT 441 MODULE 1 TEST QUESTIONS
WITH ALL CORRECT ANSWERS
GRADED A+
Trojan (software attack) - Answer--an executable program that masquerades as
performing a benign activity but also does something malicious
-optimizer, calendar, online game, video capture, etc.
Bot (software attack) - Answer--allows the infected computer to be under the remote
control of an attacker
-the infected robot computer is known as a bot or zombie
-attackers can create a botnet under the control of a bot herder
Spyware (software attack) - Answer--tracks software that is deployed without the
consent or control of the user
-silently captures and stores each keystroke that a user makes
Logic Bomb (software attack) - Answer--lies dormant and evades detection until a
specific logical event triggers it
Denial of Service Attacks (software attack) - Answer--prevent authorized users from
accessing a system by overwhelming it with requests
-most DoS attacks today are distributed denial of service (DDoS)
DDoS Smurf attack (software attack) - Answer--the attacker creates a very large
number of ICMP packets
-broadcasts ICMP packets to the network using the victim's IP address
-all active recipients will reply to the victim's IP address
-too much network traffic cripples the victim's device
DDoS SYN Flood Attacks (software attack) - Answer--three-way TCP/IP handshake
process is used to initiate network sessions
-starts by sender sending a synchronize message
-the receiving server responds using its own SYN, plus an acknowledgement, called
SYN+ACK
DDos for Hire (software attack) - Answer--renting out or purchasing DDoS attack
services from cybercriminals
Communication Interception attacks (software attacks) - Answer--Man in the middle:
attacker is positioned between two parties, goal is eavesdropping, making copies,
and/0r impersonating
-two phases: 1. intercepting the traffic 2. decrypting the transmissions
, Communication Interception Attacks relating to MAC addresses (software attack) -
Answer--ARP maps an IP address to a physical address
-MAC addresses are stored in the ARP cache
-if the IP address for a device is known but not the MAC, you can look it up by sending
an ARP packet
Changing MAC address (software attack) - Answer--the attacker imitates another
computer by means of changing the MAC address
-attackers link their MAC address with an authentic IP on the network
7. Technical Hardware Failures - Answer--occur when a manufacturer distributes
equipment containing a known or unknown flaw
-can cause the system to perform outside of expected parameters, resulting in
unreliable service or lack of availability
-failures are measured in mean time between failure and mean time to failure
9. Technological Obsolescence - Answer--antiquated or outdated infrastructure can
lead to unreliable and untrustworthy systems
10. Theft - Answer--could be physical or electronic
Management and Leadership - Answer--management is the process of achieving
objectives using a given set of resources
-informational
-interpersonal
-decisional
Difference between leadership and management - Answer--leaders do not always
perform managerial function
-managers are often assigned roles in which they are not responsible for personnel
-effective managers can be effective leaders
The POLC Approach to Infosec management - Answer-Planning, Organizing, Leading,
and Controlling
Planning in POLC approach - Answer--identify information assets
-budget and resource allocation
-contingency planning
Organizing in POLC approach - Answer--define roles and responsibilities
-establish policies and procedures
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller victoryguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.89. You're not tied to anything after your purchase.