Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
7Activity
0 of .
Results for:
No results containing your search query
P. 1
Quiz 2

Quiz 2

Ratings: (0)|Views: 1,793 |Likes:
Published by scribd5846

More info:

Published by: scribd5846 on Mar 13, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

06/22/2013

pdf

text

original

 
1.
Explain, in your words, how security should help the business as opposed to put up obstacles? Providedetailed examples. (Points : 6)
2.
Define social engineering. Provide a detailed example of how an attacker might execute a social
 
engineering attack? What kinds of things could an organization do to protect themselves from yourattack?(Points : 6)
3.
Duplication of software-based intellectual property is more commonly known as software
 
 ____________________.(Points : 2)
 
piracy
 
4.
 ____________________ is a technique used to gain unauthorized access to computers, wherein theintruder sends messages to a computer that has an IP address that indicates that the messages are coming
 
from a trusted host and not the actual source computer.(Points : 2)
 
 
spoofing
 
5.
A(n) ____________________ is an act or action that takes advantage of a vulnerability to compromisea controlled system.(Points : 2)
attack
 
6.
A(n) ____________________ is an identified weakness in a controlled system, where controls are not
 
present or are no longer effective.(Points : 2)
 
vulnerability
 
7.
The timing attack
 
works by exploring the contents of a ____________________.(Points : 2)
 
Web browser's cache
 
8.
 “4
-1-
9” fraud is an example of a(n) ____ attack.
(Points : 2)Social EngineeringWormSPAMTiming
 
Hacking
9.
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enterpremises or systems they have not been authorized to enter.(Points : 2)NatureTrespass
 
Bypass
 
GodKindness
10.
Which of the following functions does information security perform for an organization?(Points : 2)
Protects the organization’s ability to func
tion 
Enables the safe operation of applications implemented on the organization’s IT systems
 Protects the data the organization collects and uses. 
 
All of the aboveNone of the above
11.
An attempt to gain personal information from an invidual is what kind of attack? Choose the bestanswer. (Points : 2)TrojanVirus
 
Social Engineering
 
SPAMPhishing
12.
The application of computing and network resources to try every possible combination of options whenguessing a password is called what? Choose the best answer. (Points : 2)
 
Hacking
 
Dictionary Attack
 
Brute Force AttackTrojan AttackLogic Bomb
13.
A hacker who typically uses already built, expertly written scripts as opposed to writing his/her own is
 
often called what? Choose the best answer. (Points : 2)
 
Elite HackerUnskilled HackerPhreakerScript KiddiePacket Monkey
14.
Which of the following is an example of a Trojan horse program?(Points : 2)
 
NetSky
 
MyDoom
 
KlezHappy99.exe
15.
Information security’s primary mission is to ensure that systems and their contents retain their
confidentiality at all costs.(Points : 2)
 
TrueFalse
16.
Hackers
are “people who use and create computer software to gain access to informationillegally.” 
(Points : 2)TrueFalse
17.
A(n) polymorphic threat is one that changes its apparent shape over time, making it undetectable by
 
techniques that look for preconfigured signatures(Points : 2)
 
True

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Salamy Ali liked this
Felipe Lima liked this
Ahmed Albadi liked this
Ahmed Albadi liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->