Intro to cyber Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the term for submitting a fake but very high bid to deter other bidders?

Bid shielding

What class of address is the IP address 193.44.34.12?

C

What protocol translates web addresses into IP addresses?

DNS

Which layer of the OSI model is divided into two sublayers?

Data link

Mohammed needs to open a firewall port so that web traffic can be passed through the firewall. What protocol is used for web pages, and on which port does it work?

HTTP, port 80

Which of the following is a unique hexadecimal number that identifies your network card?

MAC address

You are assigned with attaching connectors to segments of cable. What type of connector is used with network cables?

RJ-45

Which of the following is a device used to connect two or more networks?

Router

What protocol is used to send email, and on what port does it work?

SMTP, port 25

Gunther is setting up encrypted remote communications so that the server admins can remotely access servers. What protocol is used for remotely logging on to a computer in a secure manner?

SSH

What is the term for a seller bidding on her own item to drive up the price?

Shill bidding

You are explaining the history of networking to a group of first-year students/ What did Vince Cerf invent?

TCP

You are explaining the history of networking to a group of first-year students/ What did Tim Berners-Lee invent?

The World Wide Web

How big is a TCP packet header?

The size is always 20 bytes

What is typically the goal of identity theft?

To make illicit purchase

Sheryl is explaining the OSI model to new technicians at her company. She is trying to explain what protocols operate at the various layers of the OSI model. At what layer of the OSI model does TCP operate?

Transport

Which of the following was one of the three universities involved in the original network set up by a government agency?

UC Berkeley

Malek is purchasing cable to use in setting up small office networks. He wants to stock up on commonly used cable. What type of cable do most networks use?

UTP

Internet addresses of the form www....com are called what?

Uniform resource locators

What type of cable is used in most networks?

Unshielded Twisted Pair

You have just taken over network support for a small community college. You want to take steps to secure your network. Before you can formulate a defense for a network, what do you need?

a clear picture of the dangers

What do law enforcement officials usually require of a victim in order to pursue harassment allegations?

a credible threat of harm

What is a penetration tester?

hacks to test vulnerabilities

Why is cyber stalking a serious crime?

it can lead to violent crime

Why is it useful to have a separate credit card dedicated to online purchases?

it will limit financial liability

If you are a victim of cyber stalking, what should you do to assist the police?

keep multiple copies of all communication

What can you do on your local computer to protect your privacy?

security settings

The IP address 127.0.0.1 always refers to what?

self

What is the name for the hacking technique that involves using persuasion and deception to get a person to provide information to help compromise security?

social engineering

What is malware?

software with malicious purpose

Which of the following is a major resource for detailed information on a computer virus?

the f-secure virus library

Juan has just installed a new T1 line in a medical office. The front desk receptionist has asked what speed they can expect. A T1 line sends data at what speed?

1.54Mbps

You are examining a list of IP addresses. Some are internal, some are external, and some are not valid. Which of the following is not a valid IP address?

295.253.254.01

Which U.S. government agency first funded the development of the Internet?

Advanced Research Projects Agency

The first computer incident response team is affiliated with what university?

Carnagie-mellon

Which of the following is not one of the security and exchange commission's tips for avoiding investment fraud?

Doesn't invest online

What are the four categories of auction fraud?

Failure to send, to disclose, sending something of lesser value, failure to deliver

John is working with command line utilities to gather diagnostic information about a computer that cannot connect to the network. Which utility provides information about a machine's network configuration?

IPConfig

What is the top rule for avoiding internet fraud?

If it seems to good to be true, it probably is

What is the most likely problem with unsolicited investment advice?

Might not be unbiased

John is trying to simply connect three computers in a small network. He does not need any sort of routing capability and is not concerned about network traffic. What is the simplest device for connecting computers?

NIC

Sharice is trying to teach a new technician basic networking terms. What should she tell this new technician NIC stands for?

Network Interface Card

What is the name for the point where the backbones of the Internet connect?

Network access points

What is the term for the most common type of Internet investment fraud?

Nigerian Fraud

What is a cookie?

a small file that stores data locally

What percentage of cyber stalking cases escalate to real world violence?

about 19%

Which of the following is the best definition of the term sensitive information?

any info that if accessed by unauthorized personal could damage your org in any way

Which of the following types of privacy law affects computer security?

any privacy law applicable to your organization

Being able to define attack terms is an important skill for a cyber security professional. What is a computer Virus?

any program that self-replicates

Being able to define attack terms is an important skill for a cyber security professional. What is spyware?

any software that monitors your system

What is cyber stalking?

any use of electronics to stalk a person

Which of the following is the most basic security activity?

authentication

There are many threats on the internet. Which one is currently the most common may change over time, but certain threats have always been more common than others. Which of the following is the most common threat on the internet?

computer viruses

What is the top way to protect yourself from cyber stalking?

do not use your real identity online

What is war-driving?

driving and looking for wireless connection for hacking

Identity theft is generally motivated by what?

economic gain

According to a survey of 223 computer professionals prepared by the computer security institute, which of the following was most often cited an an issue by respondents?

employee abuse

What is the first step in protecting yourself from identity theft?

never provide unnecessary information

What is the top rule for chat room safety?

never use real identifying information

You are trying to explain security to a nontechnical manager. She has taken a rather extreme view of computer Security. Which of the following is one of the extreme viewpoints about computer security discussed in this chapter?

no imminent danger

What must exist for cyber stalking to be illegal in a state or territory?

nothing, existing stalking laws apply

Mary is teaching an introductory cybersecurity course to freshmen. She is explaining to them the major threats. Which of the following is not one of the three major classes of threats?

online auction fraud

Which of the following is not an efficient method of protecting yourself from auction fraud?

only use auctions for inexpensive items

The most desirable approach to security is the one that is which of the following?

perimeter and dynamic

What are the three approaches to security?

perimeter, layered, hybrid

Elizabeth is explaining various hacking terms to a class. She is in the process of discussing the history of phone system hacking. What is the term for hacking a phone system?

phreaking

Defining your security strategy is an important step in securing a network. You are trying to classify devices based on the approach they take to security. An intrusion detection system is an example of which of the following?

proactive security

If you are posting anonymously in a chat room and another person threatens you with assault or even death, is this person's post harassment?

probably not; both parties are anonymous

What is the term for artificially inflating a stock in order to sell it at a higher value?

pump and dump


संबंधित स्टडी सेट्स

Economics Unit 2 Interactive Review

View Set

A&P1, CH.1.6, membranes and organs

View Set

Chapter 5 Semester Test Study Guide - Intro. to Criminal Justice

View Set

NYS Life and Health Pre License: XCEL ch 1

View Set

Combo with "drivechapta30" and 14 others

View Set

Chapter 33: THE BUILDING OF GLOBAL EMPIRES

View Set

The Early Republic Lesson 7 Jacksonian Democracy

View Set