18. An IT professional makes a backup of critical information from a company’s system so it can still be accessed if the system is attacked. Which key principle for designing information security policies does this represent?
Black hats are malicious. White hats identify weaknesses to help mitigate threats.
Black hats try to find weaknesses, but white hats don’t.
Neither black hats nor white hats can be trusted.
Black hats work with owners to fix problems. White hats just try to get into a system.
20. After a user downloads a free software product, the computer’s browser automatically opens and jumps to random product pages. What kind of malicious software is this?
21. An unhappy systems administrator installed malware that attacked after a timed event, rather than when it was installed. What type of malware does this describe?
22. A victim connects to a network they think is legitimate, but the network is really an identical network controlled by a hacker. What type of network attack are they a victim of?
24. An attacker sends a large number of SYN packets, but does not send any ACK messages back. The connection stays open and uses up the source’s resources. What is this attack called?
27. An email message tells a user there is a problem with the user’s bank account. The email directs the user to a login page that steals the user’s information. What is this called?