Professional Documents
Culture Documents
a. Data Leakage
b. Wire Tapping
c. Data Tapping
d. None of the above
Answer: B. Backdoors
Answer: A. Virus
Answer: C. Worms
6. These are Programs that do not self-replicate but rather are programed to detonate.
a. Virus
b. Backdoors
c. Worms
d. Logic Bombs
8. Vigie wants to make sure that her system is designed in a manner that allows tracing
actions to an individual. Which phase of access control is Vigie concerned about?
a. Identification
b. Authentication
c. Authorization
d. Accountability
Answer: D. Accountability
9. During which phase access control does the system answer the question “Where can
the requestor access?”
a. Identification
b. Authentication
c. Authorization
d. Accountability
Answer: C. Authorization
Answer: B. Ownership
11. It is the central part of a computing environment’s hardware, software and firmware that
enforces access control.
a. Security Kernel
b. CPU
c. Memory
d. Motherboard
Answer: A. Security Kernel
13. Firewall examines each _________ that are entering or leaving the internal network.
a. Email Users
b. Updates
c. Connections
d. Data Packets
14. It begins from outer rationale to figure out which password variety might be destined to
succeed, and afterward proceeds with the simple way to deal with attempt numerous
potential varieties.
a. Reverse brute force attack
b. Simple brute force attack
c. Hybrid brute force attack
d. Credential Stuffing
15. In Los Angeles, in October 1998, district attorneys charged four men with fraud for
allegedly installing computer chips in gasoline pumps that cheated consumers by
overstating the amounts pumped. This attack is commonly known as _____
a. Brute Force Attack
b. Salami Technique
c. Social Engineering
d. Spoofing
Answer: B. Salami Technique
16. I. Email spamming refers to sending email to thousands and thousands of users –
similar to a chain letter.
II. Spoofing is a psychological manipulation of people into performing actions or
divulging confidential information.
a. Statement 1 is true.
b. Statement 2 is true.
c. Both statements are true.
d. Both Statements are false.
Answer: A. Statement 1 is true
17. Where do most attacks on an organization’s computer resources originate?
a. From the internet
b. From inside the network
c. From universities
d. From intruders who gain physical access to the computer resources
Answer: B. From inside the network
18. It is the fraudulent practice of sending emails purporting to be from reputable companies
in order to reveal personal information, such as passwords, and credit numbers.
a. Quad Pro Quo
b. Phishing
c. Tailgaiting
d. Baiting
Answer: B. Phishing
19. These are the following types of Social engineering except
a. Quad Pro Quo
b. Phishing
c. Tailgaiting
d. Baiting
Answer: A. Quad Pro Quo
20. It is also known as an exhaustive search, is a cryptographic hack that relies on guessing
possible combinations of a targeted password until the correct password is discovered.
a. Salami attack
b. Brute Force attack
c. Social Engineering
d. Spoofing
Answer: B. Brute Force Attack