Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is an operation used on binary numbers not found in normal math? A. AND B. PLUS C. MINUS D. None of the above

A. AND

When an attacker injects client-side scripts into web pages viewed by other users so that those users interact with it, it is an example of __________. A. Cross-site Scripting B. Phreaking C. Phishing D. None of the Above

A. Cross-site Scripting

Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and __________. A. Data often has intrinsic value. B. Data is an asset that appreciates. C. Data lasts forever. D. None of the Above

A. Data often has intrinsic value.

Which of the following is one way to protect yourself against identity theft? A. Do not provide personal information to anyone if it is not absolutely necessary. B. Use Firefox as your web browser. C. Use Windows as your operating system. D. None of the above.

A. Do not provide personal information to anyone if it is not absolutely necessary.

__________ is the process to scramble a message or other information so that it cannot be easily read. A. Encryption B. Cryptography C. Keying D. Decryption

A. Encryption

Which TCP/IP protocol operates on ports 20 and 21 and is used for transferring files between computers? A. FTP B. SMTP C. HTTP D. DNS

A. FTP

Giving personnel access to only data that they absolutely need to perform their jobs is referred to as __________. A. Least privileges B. Job rotation C. Business continuation planning D. None of the Above

A. Least privileges

Micro blocks, SYN cookies, RST cookies, and stack tweaking are defenses against __________. A. TCP SYN Flood Attacks B. Phishing C. Viruses D. None of the Above

A. TCP SYN Flood Attacks

A SQL statement may begin with the word SELECT. A. True B. False

A. True

A firewall can be configured to disallow certain types of incoming traffic that may be attacking. A. True B. False

A. True

A host is a machine with data on it, to which you can connect. A. True B. False

A. True

A virtual private network is a way to use the internet to create a connection between a remote user and a central location. A. True B. False

A. True

Blocking ICMP packets may help prevent denial-of-service attacks. A. True B. False

A. True

Cipher text is encrypted text. A. True B. Flase

A. True

Cross-Site Scripting attacks target the user instead of the web application? A. True B. False

A. True

Employees with access to any sensitive information should be asked to sign nondisclosure agreements. A. True B. False

A. True

Malware that executes when a specific criteria is met is a logic bomb. A. True B. False

A. True

Malware that is portable to all operating systems or platforms is considered web-based code. A. True B. False

A. True

One good practice in a chat room is not to use your real name. A. True B. False

A. True

Ping scanning may be stopped by blocking ICMP packets. A. True B. False

A. True

Someone who breaks into a system legally to assess security deficiencies is a sneaker. A. True B. False

A. True

The most common method to deliver spyware to a target system is by using a Trojan horse. A. True B. False

A. True

One classic denial-of-service attack distributed by email was __________. A. myDoom B. Linux C. pingflood D. None of the Above

A. myDoom

The virus/worm that combined email attachments along with a fake virus warning was the __________ virus. A. Mimail B. Bagle C. Nonvirus D. None of the Above

B. Bagle

Someone who gains access to a system and causes harm is a __________? A. White hat hacker B. Black hat hacker C. Grey hat hacker D. Red hat hacker

B. Black hat hacker

Using the __________ cipher you choose some number by which to shift each letter of a text. A. DC4 B. Caesar C. Multi-alphabet substitution D. ASCII

B. Caesar

A black hat hacker is also called a __________. A. Thief B. Cracker C. Sneaker D. None of the above.

B. Cracker

For security reasons, when an employee leaves a company, you should conduct a(n) __________ interview. A. Security B. Exit C. Employment D. Scanning

B. Exit

Which of these is a repository for detailed information on virus outbreaks? A. Computer Emergency Response Team B. F-Secure C. SANS Institute D. Microsoft Security Advisor

B. F-Secure

A smurf attack is a type of malware attack. A. True B. False

B. False

A teardrop attack involves sending a forged packet to the victim. A. True B. False

B. False

An echo-chargen attack occurs when the attacker sends a forged packet with the same source IP address and destination IP address as the target's IP address. A. True B. False

B. False

Auditing is the process to determine if a user's credentials are authorized to access a network resource. A. True B. False

B. False

Black hat hackers are also known as script kiddies. A. True B. False

B. False

Firefox is an example of a phishing site. A. True B. False

B. False

Hiding messages in images is an example of stenography. A. True B. False

B. False

IPsec can only encrypt the packet data but not the header information. A. True B. False

B. False

NMAP is a popular hacking tool. A. True B. False

B. False

NetBIOS is an example of a port scanner. A. True B. False

B. False

Software that lays dormant until some specific condition is met is a Trojan horse A. True B. False

B. False

Someone who uses the Internet to harrass, threaten, or intimidate another person is guilty of identity theft. A. True B. False

B. False

The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans. A. True B. False

B. False

The IP command-line command to determine your computer's IP address, subnet mask, and default gateway is ping. A. True B. False

B. False

The first four bytes of the MAC address identify the vendor. A. True B. False

B. False

The process to induce you to provide personal information through a website is called cyberstalking. A. True B. False

B. False

The Microsoft Office suite is a tempting target for viruses because __________. A. It is so ubiquitous. B. It is designed so that legitimate programmers can access its internal objects. C. It contains virus programming tools. D. None of the Above.

B. It is designed so that legitimate programmers can access its internal objects.

With asymmetric cryptography a different __________ is used to encrypt the message and to decrypt the message. A. Code B. Key C. Lock D. Script

B. Key

The recommended Internet Explorer privacy setting is __________. A. Medium B. Medium High C. Very High D. None of the Above

B. Medium High

Scanning bulletin boards, making phony phone calls, and visiting websites by a hacker are examples of __________. A. Active scanning B. Passive scanning C. Phreaking D. Souring

B. Passive scanning

A(n) __________ hides the internal network's IP address and presents a single IP address to the outside world A. Firewall B. Proxy server C. Intrusion detection system D. Network Monitor

B. Proxy server

A(n) __________ hides the internal network's IP address and presents a single IP address to the outside world. A. Firewall B. Proxy server C. Intrusion detection system D. Network monitor

B. Proxy server

With __________ encryption, one key is used to encrypt a message, and another is used to decrypt the message. A. Private key B. Public key C. Cipher D. None of the above

B. Public key

Which device is used to boost a signal? A. Hub B. Repeater C. Switch D. Router

B. Repeater

One tool used for a denial-of-service attack is __________. A. Linux B. Tribal Flood Network C. UDP D. None of the Above

B. Tribal Flood Network

The virus/worm transmitted in a zip file attached to an email with an enticing message is __________. A. W32/Netsky-P B. Troj/Invo-Zip C. MacDefender D. None of the Above

B. Troj/Invo-Zip

Firefox and Internet Explorer are examples of __________. A. Cookies B. Web Browsers C. Websites D. Proxy Servers

B. Web Browsers

A program that can propagate without human interference is a __________. A. Virus B. Worm C. Trojan Horse D. None of the Above

B. Worm

__________ is a block cipher that uses a variable-length key ranging from 32 to 448 bits. A. 3DES B. AES C. Blowfish D. RC4

C. Blowfish

__________ attacks are becoming less common in modern operating systems. A. Denial of Service B. SYN Flood C. Buffer Overflow D. None of the Above

C. Buffer Overflow

If an IP address has the number 192 in the first octet, it is a class __________ address. A. A B. B C. C D. D

C. C

The virus/worm that specifically targets Macintosh computers is __________. A. W32/Netsky-P B. Troj/Invo-Zip C. MacDefender D. None of the Above

C. MacDefender

The virus/worm that sends emails to victims telling them to delete a needed system file is the __________ virus. A. Mimail B. Bagle C. Nonvirus D. None of the Above

C. Nonvirus

Which of the following is the process to try to induce someone to provide you with personal information? A. Cyberstalking B. Looping C. Phishing D. Licensing

C. Phishing

Someone who performs a cyberattack without actually understanding it is a __________. A. Grey hat hacker B. White hat hacker C. Script kiddie D. None of the Above

C. Script kiddie

Which type of hacking occurs when the attacker monitors an authenticated session between the client and the server and takes over that session? A. Denial of Service B. Web Attack C. Session Hijacking D. None of the above

C. Session Hijacking

Cookies and key loggers are examples of __________. A. Viruses B. Worms C. Spyware D. None of the Above

C. Spyware

Which device can connect many computers and sends data only out of one port? A. Hub B. Repeater C. Switch D. Router

C. Switch

Which of these is NOT a type of symmetric algorithm? A. Stream B. Block C. Transcription D. None of the above

C. Transcription

The IP utility used to test connectivity with a remote host is __________. A. CIDR B. tracert C. ping D. None of the above

C. ping

Which TCP/IP protocol operates on port 53 and translates URLs into Web addresses? A. FTP B. SMTP C. HTTP D. DNS

D. DNS


संबंधित स्टडी सेट्स

Pearson Science Topic 2 Water Cycle

View Set

Lesson 2 English Composition II (Assignment 4)

View Set

KU BIOL 150 CH.11 Learning Curve

View Set

chapter 15 psychological disorders quiz

View Set