Cyber Security Quizzes 3 & 4 little bit of 7
If Bob wants to encrypt a message that can only be read by Alice using Public Key Encryption what key will Bob use. A)Alice's public key B)Alice's private key C)Bob's private key D)Bob's public key
Alice's public key
What is another term for preemptive blocking? A)User deflection B)Intrusion deflection C)Intruder blocking D)Banishment vigilance
Banishment vigilance
Which of the following is the oldest known encryption method? A)Multi-alphabet B)Cryptic cipher C)PGP D)Caesar cipher
Caesar cipher
What was the name of the machine the Germans invented and used during World War I and II to encrypt messages? A)Atarii B)Colossus C)NES 64 D)Enigma
Enigma
A profiling technique that monitors how applications use resources is called what? A)Executable profiling B)Application monitoring C)System monitoring D)Resource profiling
Executable profiling
This is NOT a form of PII that attackers are interested in. A)Social Security Number (SSN) B)Full name C)Address D)Hair color
Hair color
A System that is setup for attracting and monitoring intruders is called what? A)Hacker cage B)Trap door C)Honeypot D)Fly paper
Honeypot
Which of the following most accurately explains why minimum necessary privileges for a user help protect against Trojan horses? A)If a user cannot remove programs, then he cannot remove anti-spyware and antivirus software accidentally. B)If the user cannot install programs, it is less likely that will install a Trojan horse. C)If the user cannot install programs, it is completely impossible that he will install a Trojan horse. D)If the user cannot remove programs, he cannot alter the security settings you have put on his machine.
If the user cannot install programs, it is completely impossible that he will install a Trojan horse
This is a type of "Authority" attack where someone pretends to be someone they are not and are in a respected position of authority. A)Impersonation B)Command and Control C)Reciprocation D)Diffusion of Responsibility
Impersonation
Which of the following is the primary weakness in the Caesar cipher? A)There is no significant weakness; the Caesar cipher is adequate for most encryption uses B)It does not use complex mathematics C)It does not disrupt letter frequency. D)It does not use a public key system
It does not disrupt letter frequency.
Which of the following are the two most common things? Trojan horse programs do? A)Launch DDoS attacks and open back doors B)Install spyware and launch Ping of Death attacks C)Delete registry keys and alter system files D)Hijack the home page and delete registry keys
Launch DDoS attacks and open back doors
Why is encryption an important part of security? A)No matter how secure you network is, the data being transmitted is still vulnerable without encryption B)Encrypted transmissions are only necessary with VPNs C)Encrypted transmissions will help stop denial of service attacks D)A packet that is encrypted will travel faster across networks
No matter how secure you network is, the data being transmitted is still vulnerable without encryption
What is active code scanning? A)Scanning that is occurring all the time (i.e. actively) B)Scanning for active web elements (scripts, ActiveX, and so on) C)Actively scanning for malicious code D)Actively scanning for worms
Scanning for active web elements (scripts, ActiveX, and so on)
What is heuristic scanning? A)Scanning using a rules-based approach B)Scanning based on a virus definition file C)Scanning only system management areas (registry, boot sector, etc.) D)Scheduled scanning
Scanning using a rules-based approach
This type of attack tries to convince the target that there is only a limited number of items available? A)Authority B)Commitment C)Scarcity D)Likening
Scarcity
Which of the following is not a profiling strategy used in anomaly detection? A)Threshold monitoring B)System monitoring C)Executable profiling D)Resource profiling
System monitoring
This is when someone tries to gain access to a restricted area by walking in after someone else has opened the door? A)Tailgating B)Backpacking C)Riding your tail D)Shoulder surfing
Tailgating
Setting up parameters for acceptable use, such as the number of login attempts, and watching to see if those levels are exceeded is referred to as what? A)Threshold monitoring B)Resource profiling C)System monitoring D)Executable profiling
Threshold monitoring
A Transposition Cipher like Rail Fence rearranges each letter with a different letter True False
True
Substitution Cipher like Caesar Cipher replaces each letter with a different letter True False
True
This is a type of phishing attack that targets a specific individual that is at a high level in the company? A)Smishing B)Whaling C)Spear Phishing D)Vishing
Whaling
Which binary mathematical operation can be used for a simple encryption method? A)Bit swap B)OR C)Bit shift D)XOR
XOR
Moore's Law states that the number of transistors in a dense integrated circuit ___________ about every two years. A)triples B)doubles C)quadruples D)stays the same
doubles
What type of encryption uses a different key to encrypt the message than it uses to decrypt the message? A)Public key B)Secure C)Private key D)Symmetric
Public key