CIS 2337 Midterm review Questions with Complete Solutions Computer Security - Correct Answers ✅Methods, techniques, ans tools used to ensure a computer system is secure.Critical Infrastructure - Correct Answers ✅Infrastructure whose loss/impairment would have severe repercussions.Elite Hacker - Correct Answers ✅Skills necessary to discover and exploit new vulnerabilities.Hacker - Correct Answers ✅someone who accesses a computer or network illegally Hacking - Correct Answers ✅Intentionally accesses a computer without authorization or exceeds authorized access.Hacktivist - Correct Answers ✅a politically motivated hacker who uses the Internet to send a political message of some kind.Highly structured threat - Correct Answers ✅Threat backed by the time and resources to allow any form of attack 1 / 3
CIS 2337 Midterm review Questions with Complete Solutions information warfare - Correct Answers ✅the use of information security techniques, both offensive and defensive, when combating an opponent Morris worm - Correct Answers ✅One of first internet crimes. Infected computer systems until they could no longer run.script kiddie - Correct Answers ✅An unskilled user who downloads automated attack software to attack computers Structured threat - Correct Answers ✅Threat with reasonable financial backing and can last a few days or more.More time to penetrate and attack.Unstructured Threat - Correct Answers ✅Threat with no significant resources/ability A friend of yours has just been hired by an organization as its computer security officer. Your friend is a bit nervous about this new job and has come to you, knowing that you are taking a computer security class, to ask your advice on measures that can be taken that might help prevent an intrusion. What three things can you suggest that are simple but can tremendously help limit the possibility of an attack? - Correct Answers ✅C I A - Confidentiality, integrity, and availability 2 / 3
CIS 2337 Midterm review Questions with Complete Solutions Discuss the major difference between a target of opportunity attack and a targeted attack. Which do you believe is the more common one? - Correct Answers ✅A target of opportunity attack is usually victim due to HW/SW vulnerabilities. A targeted attack is when the victim is specifically targeted for some reason.Target of opportunity attack is more common because most attackers exploit vulnerabilities.Reread the various examples of computer crimes at the beginning of this chapter. Categorize each as either a crime where the computer was the target of the criminal activity or a crime in which the computer was a tool in accomplishing the criminal activity. - Correct Answers ✅1)The Morris Worm (November 1988) - target 6) Solar Sunrise (February 1998) - target 7) The Melissa Virus (March 1999) - tool 8) The Love Letter Virus (May 2000) - tool 9) The Code Red Worm (2001) - tool 11) The Slammer Worm (2003) - target 13) Conficker (2008) - target
- / 3