100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
INMT 441 MODULE 1 TEST QUESTIONS WITH ALL CORRECT ANSWERS GRADED A+ $11.89   Add to cart

Exam (elaborations)

INMT 441 MODULE 1 TEST QUESTIONS WITH ALL CORRECT ANSWERS GRADED A+

 3 views  0 purchase
  • Course
  • INMT 441
  • Institution
  • INMT 441

INMT 441 MODULE 1 TEST QUESTIONS WITH ALL CORRECT ANSWERS GRADED A+ Trojan (software attack) - Answer--an executable program that masquerades as performing a benign activity but also does something malicious -optimizer, calendar, online game, video capture, etc. Bot (software attack) - Answer...

[Show more]

Preview 2 out of 9  pages

  • October 24, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • INMT 441
  • INMT 441
avatar-seller
victoryguide
INMT 441 MODULE 1 TEST QUESTIONS
WITH ALL CORRECT ANSWERS
GRADED A+

Trojan (software attack) - Answer--an executable program that masquerades as
performing a benign activity but also does something malicious
-optimizer, calendar, online game, video capture, etc.

Bot (software attack) - Answer--allows the infected computer to be under the remote
control of an attacker
-the infected robot computer is known as a bot or zombie
-attackers can create a botnet under the control of a bot herder

Spyware (software attack) - Answer--tracks software that is deployed without the
consent or control of the user
-silently captures and stores each keystroke that a user makes

Logic Bomb (software attack) - Answer--lies dormant and evades detection until a
specific logical event triggers it

Denial of Service Attacks (software attack) - Answer--prevent authorized users from
accessing a system by overwhelming it with requests
-most DoS attacks today are distributed denial of service (DDoS)

DDoS Smurf attack (software attack) - Answer--the attacker creates a very large
number of ICMP packets
-broadcasts ICMP packets to the network using the victim's IP address
-all active recipients will reply to the victim's IP address
-too much network traffic cripples the victim's device

DDoS SYN Flood Attacks (software attack) - Answer--three-way TCP/IP handshake
process is used to initiate network sessions
-starts by sender sending a synchronize message
-the receiving server responds using its own SYN, plus an acknowledgement, called
SYN+ACK

DDos for Hire (software attack) - Answer--renting out or purchasing DDoS attack
services from cybercriminals

Communication Interception attacks (software attacks) - Answer--Man in the middle:
attacker is positioned between two parties, goal is eavesdropping, making copies,
and/0r impersonating
-two phases: 1. intercepting the traffic 2. decrypting the transmissions

, Communication Interception Attacks relating to MAC addresses (software attack) -
Answer--ARP maps an IP address to a physical address
-MAC addresses are stored in the ARP cache
-if the IP address for a device is known but not the MAC, you can look it up by sending
an ARP packet

Changing MAC address (software attack) - Answer--the attacker imitates another
computer by means of changing the MAC address
-attackers link their MAC address with an authentic IP on the network

7. Technical Hardware Failures - Answer--occur when a manufacturer distributes
equipment containing a known or unknown flaw
-can cause the system to perform outside of expected parameters, resulting in
unreliable service or lack of availability
-failures are measured in mean time between failure and mean time to failure

8. Technical Software Failures - Answer--broken authentication
-broken access control
-weak security configurations
-insufficient attack protection

9. Technological Obsolescence - Answer--antiquated or outdated infrastructure can
lead to unreliable and untrustworthy systems

10. Theft - Answer--could be physical or electronic

Management and Leadership - Answer--management is the process of achieving
objectives using a given set of resources
-informational
-interpersonal
-decisional

Difference between leadership and management - Answer--leaders do not always
perform managerial function
-managers are often assigned roles in which they are not responsible for personnel
-effective managers can be effective leaders

The POLC Approach to Infosec management - Answer-Planning, Organizing, Leading,
and Controlling

Planning in POLC approach - Answer--identify information assets
-budget and resource allocation
-contingency planning

Organizing in POLC approach - Answer--define roles and responsibilities
-establish policies and procedures

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller victoryguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.89. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.89
  • (0)
  Add to cart