CSCE 201 Test 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

10. When a hacking technique uses persuasion and deception to get a person to provide information to help them compromise security, this is referred to as what? A. Social engineering B. Conning C. Human intel D. Soft hacking

A

11. What protocol is used for remotely logging on to a computer? A. Telnet B. HTTP C. DNS D. SMTP

A

1. The most common Internet investment fraud is known as what? A. The Nigerian fraud B. The Manhattan fraud C. The pump and dump D. The bait and switch

A

12. What are the three approaches to security? A. Perimeter, layered, hybrid B. High security, medium security, low security C. Internal, external, and hybrid D. Perimeter, complete, none

A

13. An intrusion-detection system is an example of which of the following? A. Proactive security B. Perimeter security C. Hybrid security D. Good security practices

A

14. Which of the following is the most basic security activity? A. Authentication B. Firewalls C. Password protection D. Auditing

A

16. What is the first step in protecting yourself from identity theft? A. Never provide any personal data about yourself unless absolutely necessary. B. Routinely check your records for signs of identity theft. C. Never use your real name on the Internet. D. Routinely check for spyware on your computer.

A

18. Which U.S. government agency created the distributed network that formed the basis for the Internet? A. Advanced Research Projects Agency B. Central Intelligence Agency C. NASA D. Department of Energy

A

1. One extreme viewpoint about computer security is what? A. The federal government will handle security. B. Microsoft will handle security. C. There are no imminent dangers to your system. D. There is no danger if you use Linux.

C

10. According to the U.S. Department of Justice, identity theft is generally motivated by what? A. Malicious intent B. Personal hostility towards the victim C. Economic gain D. Thrill seeking

C

10. What protocol is used to send email, and on what port does it work? A. SMTP, port 110 B. POP3, port 25 C. SMTP, port 25 D. POP3, port 110

C

11. What is the most common threat on the Internet? A. Auction fraud B. Hackers C. Computer viruses D. Illegal software

C

13. The point where the backbones of the Internet connect is called what? A. Connectors B. Routers C. Network access points D. Switches

C

15. What class would the IP address of 193.44.34.12 be? A. A B. B C. C D. D

C

15. What must exist for cyber stalking to be illegal in a state or territory? A. Specific laws against cyber stalking in that state or territory. B. Specific laws against cyber stalking in that nation. C. Nothing; existing stalking laws can apply. D. Nothing; existing international cyber stalking laws apply.

C

16. The IP address of 127.0.0.1 always refers to your what? A. Nearest router B. ISP C. Self D. Nearest NAP

C

17. What can you do on your local computer to protect your privacy? A. Install a virus scanner. B. Install a firewall. C. Set your browser's security settings. D. Set your computer's filter settings.

C

17. Which of the following type of privacy law affects computer security? A. Any state privacy law B. Any privacy law applicable to your organization C. Any privacy law D. Any federal privacy law

C

19. Which of the following is the best definition of the term sensitive information? A. Any information that has impact on national security B. Any information that is worth more than $1,000 C. Any information that if accessed by unauthorized personnel could damage your organization in any way D. Any information that is protected by any privacy laws

C

20. Vince Cerf invented what? A. The World Wide Web B. Email C. TCP D. The first computer virus

C

20. Which of the following is a major resource for detailed information on a computer virus? A. The MIT Virus Library B. The Microsoft Virus Library C. The F-Secure Virus Library D. The National Virus Repository

C

23. If you are a victim of cyber stalking, what should you do to assist the police? A. Nothing; it is their job and you should stay out of it. B. Attempt to lure the stalker into a public place. C. Keep electronic and hard copies of all harassing communications. D. Try to provoke the stalker into revealing personal information about himself or herself.

C

3. Artificially inflating a stock in order to sell it at a higher value is referred to as what? A. Bait and switch B. The Nigerian fraud C. Pump and dump D. The Wall Street fraud

C

4. The simplest device for connecting computers is called what? A. NIC B. Interface C. Hub D. Router

C

6. What is a sneaker? A. A person who hacks a system without being caught B. A person who hacks a system by faking a legitimate password C. A person who hacks a system to test its vulnerabilities D. A person who is an amateur hacker

C

7. A seller bidding on his or her own item to drive up the price is referred to as what? A. Bid siphoning B. Bid shielding C. Shill bidding D. Ghost bidding

C

9. A protocol that translates web addresses into IP addresses is called what? A. DNS B. TFTP C. DHCP D. SMTP

C

9. What is war-driving? A. Driving and seeking a computer job B. Driving while using a wireless connection to hack C. Driving looking for wireless networks to hack D. Driving and seeking rival hackers

C

19. Which of the following is not an efficient method of protecting yourself from auction fraud? A. Only use auctions for inexpensive items. B. Only use reputable auction sites. C. Only work with well-rated sellers. D. Only bid on items that seem realistic.

A

19. Which of the following was one of the three universities involved in the original distributed network setup by a government agency? A. Berkeley B. Harvard C. MIT D. Princeton

A

21. Tim Berners-Lee invented what? A. The World Wide Web B. Email C. TCP D. The first computer virus

A

21. Why is it useful to have a separate credit card dedicated to online purchases? A. If the credit card number is used illegally, you will limit your financial liability. B. You can keep better track of your auction activities. C. If you are defrauded, you can possibly get the credit card company to handle the problem. D. You can easily cancel that single card, if you need to do so.

A

23. The TCP protocol operates at what layer of the OSI model? A. Transport B. Application C. Network D. Data link

A

24. What is the top way to protect yourself from cyber stalking? A. Do not use your real identity online. B. Always use a firewall. C. Always use a virus scanner. D. Do not give out email addresses.

A

24. Which layer of the OSI model is divided into two sublayers? A. Data link B. Network C. Presentation D. Session

A

3. The cable used in networks is also referred to as what? A. Unshielded twisted pair B. Shielded twisted pair C. Unshielded untwisted pair D. Shielded untwisted pair

A

4. What is a computer virus? A. Any program that is downloaded to your system without your permission B. Any program that self-replicates C. Any program that causes harm to your system D. Any program that can change your Windows Registry

A

4. What is the top rule for avoiding Internet fraud? A. If it seems too good to be true, it probably is. B. Never use your bank account numbers. C. Only work with people who have verifiable email addresses. D. Don't invest in foreign deals.

A

5. What is a NIC? A. Network interface card B. Network interaction card C. Network interface connector D. Network interaction connector

A

5. What is spyware? A. Any software that monitors your system B. Only software that logs keystrokes C. Any software used to gather intelligence D. Only software that monitors what websites you visit

A

5. Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud? A. Don't invest online. B. Consider the source of the offer. C. Always be skeptical. D. Always research the investment.

A

8. What is malware? A. Software that has some malicious purpose B. Software that is not functioning properly C. Software that damages your system D. Software that is not properly configured for your system

A

9. Identity theft is most often attempted in order to accomplish what goal? A. To make illicit purchases B. To discredit the victim C. To avoid criminal prosecution D. To invade privacy

A

11. Why is cyber stalking a serious crime? A. It is frightening to the victim. B. It can be a prelude to violent crime. C. It is using interstate communication. D. It can be a prelude to identity theft.

B

12. What is cyber stalking? A. Any use of the Internet to send or post threats B. Any use of electronic communications to stalk a person C. Only use of email to send threats D. Only the use of email to stalk a person

B

12. What protocol is used for web pages, and what port does it work on? A. HTTP, port 21 B. HTTP, port 80 C. DHCP, port 80 D. DHCP, port 21

B

14. If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment? A. Yes, any threat of violence is harassment. B. Probably not, because both parties are anonymous, so the threat is not credible. C. Yes, chat room threats are no different than threats in person. D. Probably not, because making a chat room threat is not the same as making a threat in person.

B

14. Which of the following is not a valid IP address? A. 127.0.0.1 B. 295.253.254.01 C. 127.256.5.2 D. 245.200.11.1

B

15. The most desirable approach to security is one that is which of the following? A. Perimeter and dynamic B. Layered and dynamic C. Perimeter and static D. Layered and static

B

16. According to a recent survey of 223 computer professionals prepared by the Computer Security Institute, which of the following was cited as an issue by more of the respondents? A. Internal systems B. Employee abuse C. Routers D. Internet connection

B

17. Internet addresses of the form www.chuckeasttom.com are called what? A. User-friendly web addresses B. Uniform resource locators C. User-accessible web addresses D. Uniform address identifiers

B

18. The first computer incident-response team is affiliated with what university? A. Massachusetts Institute of Technology B. Carnegie-Mellon University C. Harvard University D. California Technical University

B

18. What is a cookie? A. A piece of data that web servers gather about you. B. A small file made that contains data and then is stored on your computer. C. A piece of data that your web browser gathers about you. D. A small file made that contains data and then is stored on the web server.

B

2. Before you can formulate a defense for a network you need what? A. Appropriate security certifications B. A clear picture of the dangers to be defended against C. To finish this textbook D. The help of an outside consultant

B

2. What is the most likely problem with unsolicited investment advice? A. You might not earn as much as claimed. B. The advice might not be truly unbiased. C. The advice might not be from a legitimate firm. D. You might lose money.

B

20. The top rule for chat room safety is what? A. Make certain you have antivirus software installed. B. Never use your real name or any real personally identifying characteristics. C. Only use chat rooms that encrypt transmissions. D. Use chat rooms that are sponsored by well-known websites or companies.

B

22. Which utility gives you information about your machine's network configuration? A. Ping B. IPConfig C. Tracert D. MyConfig

B

25. A unique hexadecimal number that identifies your network card is called what? A. A NIC address B. A MAC address C. A NIC ID D. A MAC ID

B

3. Which of the following is not one of the three major classes of threats? A. Attempts to intrude on the system B. Online auction fraud C. Denial of service attacks D. A computer virus

B

6. A device used to connect two or more networks together is a what? A. Switch B. Router C. Hub D. NIC

B

6. What are the four categories of auction fraud? A. Failure to send, failure to disclose, sending to wrong address, failure to deliver B. Failure to send, failure to disclose, sending something of lesser value, failure to deliver C. Failure to disclose, sending something to wrong address, failure to send, failure to deliver D. Failure to disclose, sending something of lesser value, failure to send, sending something of greater value

B

7. A T1 line sends data at what speed? A. 100Mbps B. 1.54Mbps C. 155Mbps D. 56.6Kbps

B

8. How big is a TCP packet header? A. The size is dependent on the data being sent. B. The size is always 20 bytes. C. The size is dependent on the protocol being used. D. The size is always 40 bytes.

B

8. Submitting a fake but very high bid to deter other bidders is referred to as what? A. Bid siphoning B. Bid shielding C. Shill bidding D. Ghost bidding

B

1. What type of cable do most networks use? A. Net cable B. Category 3 cable C. Phone cable D. Category 5 cable

D

13. What will law enforcement officials usually require of the victim in order to pursue harassment allegations? A. A verifiable threat of death or serious injury B. A credible threat of death or serious injury C. A verifiable threat of harm D. A credible threat of harm

D

2. The connector used with network cables is called what? A. RJ-11 B. RJ-85 C. RJ-12 D. RJ-45

D

22. What percentage of cyber stalking cases escalate to real-world violence? A. Less than 1% B. 25% C. 90% or more D. About 19%

D

7. What is the term for hacking a phone system? A. Telco-hacking B. Hacking C. Cracking D. Phreaking

D


Ensembles d'études connexes

Lesson 8: Distribution and Conversion Obversion Contraposition

View Set

Corporals Course- Administration

View Set

600 Chapt. 7 & 8 - Random Assignment, Control Techniques and and Types of Tests

View Set

Management/ Intro to Business Chapter 5

View Set

LESSON 17: CAR CRASHES, IMMINENT COLLISIONS

View Set