Preview

04 - Network Threats

 1. Fill in the blanks
Businesses, government entities, and individuals alike all have to 
pay careful attention to dangers to their computers and networks.

____________ ________________ threats are a growing problem for 
people and organizations the world over, and they only become worse
and multiply with every passing day.
networkthreats_question1.jpg

  IMAC Security

  Individual Indemnity

  Network Security

  Cache Security

 2. There are different types of Network threats. They are usually either _________ or ___________ attacks.

  Evil / Good

  Logic / resource

  Maintenance / Hacker

  Logic / Tiresome

 3. Which type of attack is this excerpt referring to? Fill in the blanks
_________________ attacks are famed for taking advantage of already
existent vulnerabilities and bugs in programs with the stated intention
of causing a system to crash. 

There are cyber criminals who exploit
this attack with the intention of willfully gaining illegal access to 
the system, or alternatively of downgrading the performance of a
given network.

  Masonic

  Logic

  Deathly

  Resource

 4. Which type of attack is this example referring to?
A second example of a ____________ attack / threat to network 
security concerns the notorious ping of death. 

In this vile attack, the perpetrator dispatches ICMP packets off to 
a system which will be greater in size than the maximum allowed capacity.
networkthreats_question4.png

  Satanic

  Resource

  Logic

  Deathly

 5. The majority of these sorts of assaults are simply avoided by_______________which proves to be vulnerable or by filtering out particular packet sequences.

  upgrading software

  downgrading software

  disengaging from the internet

  eliminating hackers

 6. Fill in the blanks in the excerpt below that outlines the nature of a resource attack.
 Such assaults are primarily meant to overwhelm important system
 resources, like R ____________ and C___________resources. 
 This is principally accomplished via dispatching numerous 
 forged requests or IP packets to the network in question.

  RAM and CPU

  Rollers and Controllers

  ROM and Computer

  Raiders and Cages

 7. What are the commonly used terms to describe this sort of resource attack/threat?
The vile cyber-criminal is capable of launching a greater and more 
potent assault in compromising the integrity of a multitude
of hosts and then installing malicious forms of software. 

This type of exploit typically results in what is well-known as a 
botnet or a ______. 

Once the botnet attack has been successful, the assailant is then 
capable of launching off additional later assaults from 
literally thousands of these ________ infected machines, 
all with the end goal of compromising
a single target victim
networkthreats_question7.jpg

  merciless

  vampire

  devil

  zombie

 8. Which of the following is NOT a type of network attack?
There are at least seven types of network attacks.
1. Spoofing.
2. Sniffing.
3. Mapping.
4. Hijacking.
5. Trojans.
6. DoS and DDoS.
7. Social engineering.

  5 is not

  None of them are

  2 and 5 are not

  They all are

 9. Internal threats inside an organisation that can compromise the network include employee theft, weak access control and ______________

  Privilege abuse

  Verbal abuse

  Violent abuse

  Substance abuse

 10. A distributed Denial of Service (DDOS) attack is a challenge to make an online service ______________________

  inaccessible by damaging the network's power supply

  inaccessible by overpowering it with traffic from numerous sources

  inaccessible by squeezing trojan horses through the cables

  accessible by allowing traffic from anywhere to enter freely

 11. It is worth noting (see screenshot below) that Wikipedia divides network threats into two types:
networkthreats_question11.png

  human and alien

  active and lazy

  massive and small

  passive and active

 12. Networks in a local area network are always perfectly secure, as compared to the internet.

  FALSE

  TRUE

 13. School networks are safe from any network threats as they connect to the internet via an ISP (Internet Secure Provider)

  FALSE

  TRUE

 14. Some companies divide up the different network threats into the following categories: internal threat, system threat and_______________

  technician threat

  middle man threat

   external threat

  worm threat

 15. Networks in a company could also be in danger or under threat from employee theft and abuse of the network.

  FALSE

  TRUE