Which threats are characterized by possibly long periods of preparation (years is not uncommon), tremendous financial backing, a large and organized group of attackers, and attempts to subvert insiders or to plant individuals inside a potential target in advance of a planned attack?
Unstructured threats
Structured threats
Which of the following is an attempt to find and attack a site that has hardware or software that is vulnerable to a specific exploit?
Target of opportunity attack
Targeted attack
Which of the following threats has not grown over the last decade as a result of increasing numbers of Internet users?
Viruses
Hackers
Denial-of-service attacks
All of these have seen an increase over the last decade.
The rise of which of the following has greatly increased the number of individuals who probe organizations looking for vulnerabilities to exploit?
Virus writers
Script kiddies
Hackers
Elite hackers
Which of the following is generally viewed as the first Internet worm to have caused significant damage and to have brought the Internet down?
Which of the following individuals was convicted of various computer crimes and was known for his ability to conduct successful social engineering attacks?
Kevin Mitnick
Vladmir Levin
Timothy Lloyd
David Smith
According to the CSI/FBI survey, which of the following statistics decreased in 2003?
The number of organizations reporting the internet as a point of attack The number of organizations that have reported unauthorized use of their systems
Both B and C
Which virus/worm was credited with reaching global proportions in less than ten minutes?
Morris worm
Slammer
The act of deliberately accessing computer systems and networks without authorization is generally known as:
Cracking
Probing
Viruses/worms
Script kiddies
Hackers
Hacktivists
Warfare conducted against the information and information processing equipment used by an adversary is known as:
Hacking
Cyber terrorism
Information warfare
Network warfare
An attacker who feels that using animals to make fur coats is unethical and thus defaces the web site of a company that sells fur coats is an example of:
Cyber crusading
Elite hacking
Electricity (power)
Banking and finance
Telecommunicaitons
Retail stores
Structured
Highly structured
Elite hackers dont account for more than what percentage of the total number of individuals conducting intrusive activity on the Internet?
1-2 percent
3-5 percent
7-10 percent
15-20 percent