CTC 452 Quiz 1
What can an attacker use a port scanner to test for on a target computer?
OPEN SOCKETS
What is a VPN typically used for?
SECURE REMOTE ACCESS
Why might you want your security system to provide nonrepudiation?
SO A USER CAN'T DENY SENDING OR RECEIVING A COMMUNICATION
Which term is best described as an attack that relies on the gullibility of people?
SOCIAL ENGINEERING
Defense in depth can best described as which of the following?
A LAYERED APPROACH TO SECURITY
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?
CHECKSUM
Which of the following is NOT one of the three primary goals of information security?
IMPARTIALITY
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
MACRO
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
MAN-IN-THE-MIDDLE
1. What is a program that appears to do something useful but is actually malware?
TROJAN