Cyber Security Quizzes 3 & 4 little bit of 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

If Bob wants to encrypt a message that can only be read by Alice using Public Key Encryption what key will Bob use. A)Alice's public key B)Alice's private key C)Bob's private key D)Bob's public key

Alice's public key

What is another term for preemptive blocking? A)User deflection B)Intrusion deflection C)Intruder blocking D)Banishment vigilance

Banishment vigilance

Which of the following is the oldest known encryption method? A)Multi-alphabet B)Cryptic cipher C)PGP D)Caesar cipher

Caesar cipher

What was the name of the machine the Germans invented and used during World War I and II to encrypt messages? A)Atarii B)Colossus C)NES 64 D)Enigma

Enigma

A profiling technique that monitors how applications use resources is called what? A)Executable profiling B)Application monitoring C)System monitoring D)Resource profiling

Executable profiling

This is NOT a form of PII that attackers are interested in. A)Social Security Number (SSN) B)Full name C)Address D)Hair color

Hair color

A System that is setup for attracting and monitoring intruders is called what? A)Hacker cage B)Trap door C)Honeypot D)Fly paper

Honeypot

Which of the following most accurately explains why minimum necessary privileges for a user help protect against Trojan horses? A)If a user cannot remove programs, then he cannot remove anti-spyware and antivirus software accidentally. B)If the user cannot install programs, it is less likely that will install a Trojan horse. C)If the user cannot install programs, it is completely impossible that he will install a Trojan horse. D)If the user cannot remove programs, he cannot alter the security settings you have put on his machine.

If the user cannot install programs, it is completely impossible that he will install a Trojan horse

This is a type of "Authority" attack where someone pretends to be someone they are not and are in a respected position of authority. A)Impersonation B)Command and Control C)Reciprocation D)Diffusion of Responsibility

Impersonation

Which of the following is the primary weakness in the Caesar cipher? A)There is no significant weakness; the Caesar cipher is adequate for most encryption uses B)It does not use complex mathematics C)It does not disrupt letter frequency. D)It does not use a public key system

It does not disrupt letter frequency.

Which of the following are the two most common things? Trojan horse programs do? A)Launch DDoS attacks and open back doors B)Install spyware and launch Ping of Death attacks C)Delete registry keys and alter system files D)Hijack the home page and delete registry keys

Launch DDoS attacks and open back doors

Why is encryption an important part of security? A)No matter how secure you network is, the data being transmitted is still vulnerable without encryption B)Encrypted transmissions are only necessary with VPNs C)Encrypted transmissions will help stop denial of service attacks D)A packet that is encrypted will travel faster across networks

No matter how secure you network is, the data being transmitted is still vulnerable without encryption

What is active code scanning? A)Scanning that is occurring all the time (i.e. actively) B)Scanning for active web elements (scripts, ActiveX, and so on) C)Actively scanning for malicious code D)Actively scanning for worms

Scanning for active web elements (scripts, ActiveX, and so on)

What is heuristic scanning? A)Scanning using a rules-based approach B)Scanning based on a virus definition file C)Scanning only system management areas (registry, boot sector, etc.) D)Scheduled scanning

Scanning using a rules-based approach

This type of attack tries to convince the target that there is only a limited number of items available? A)Authority B)Commitment C)Scarcity D)Likening

Scarcity

Which of the following is not a profiling strategy used in anomaly detection? A)Threshold monitoring B)System monitoring C)Executable profiling D)Resource profiling

System monitoring

This is when someone tries to gain access to a restricted area by walking in after someone else has opened the door? A)Tailgating B)Backpacking C)Riding your tail D)Shoulder surfing

Tailgating

Setting up parameters for acceptable use, such as the number of login attempts, and watching to see if those levels are exceeded is referred to as what? A)Threshold monitoring B)Resource profiling C)System monitoring D)Executable profiling

Threshold monitoring

A Transposition Cipher like Rail Fence rearranges each letter with a different letter True False

True

Substitution Cipher like Caesar Cipher replaces each letter with a different letter True False

True

This is a type of phishing attack that targets a specific individual that is at a high level in the company? A)Smishing B)Whaling C)Spear Phishing D)Vishing

Whaling

Which binary mathematical operation can be used for a simple encryption method? A)Bit swap B)OR C)Bit shift D)XOR

XOR

Moore's Law states that the number of transistors in a dense integrated circuit ___________ about every two years. A)triples B)doubles C)quadruples D)stays the same

doubles

What type of encryption uses a different key to encrypt the message than it uses to decrypt the message? A)Public key B)Secure C)Private key D)Symmetric

Public key


संबंधित स्टडी सेट्स

Lab Quiz #4: Care of Pts. w/ Trachs

View Set

BLAW Ch. 15 - Breach and Remedies

View Set

fundamentals final practice (missed questions)

View Set

Personal Finance Vocab: Section 3.2

View Set