Intro to Security
Malware and Social Engineering
Application and Network Attacks
Vulnerability Assessment
Host, Application and Data Security
100
These attacks are responsible for half of all malware delivered by Web advertising.
What is Fake antivirus
100
This is malicious computer code that reproduces itself on the same computer.
What is a computer virus
100
This is a language used to view and manipulate data that is stored in a relational database.
What is SQL
100
This is the expected monetary loss every time a risk occurs.
What is SLE
100
These are combination locks that use buttons which must be pushed in the proper sequence to open the door.
What is a cipher lock
200
Under this law, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
What is HIPAA
200
There are almost how many different Microsoft Windows file extensions that could contain a virus.
What is 70
200
This is the default root directory of the Microsoft Internet Information Services (IIS) Web server is
What is C:\Inetpub\ wwwroot
200
This is the probability that a risk will occur in a particular year.
What is ARO
200
This outlines the major security considerations for a system and becomes the starting point for solid security.
What is a baseline
300
This is another name for unsolicited e-mail messages?
What is spam
300
This is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
What is a logic bomb
300
HTML is a markup language that uses specific these embedded in brackets.
What are tags
300
This indicates that no process is listening at this port.
What is a closed port
300
This can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
What is a cable lock
400
This ensures that only authorized parties can view information.
What is confidentiality
400
This is an image spam that is divided into multiple images.
What is GIF Layering
400
This is part of an HTTP packet that is composed of fields that contain the different characteristics of the data being transmitted.
What is HTTP Header
400
This is a network set up with intentional vulnerabilities.
What is a honeynet
400
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
What is heuristic detection
500
This involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.
What is Identity theft
500
This uses “speckling” and different colors so that no two spam e-mails appear to be the same.
What is geometric variance
500
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system for matching computer names and numbers known as this
What is DNS
500
This type of tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.
What is a white box
500
This is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
What is DLP