You are on page 1of 4

1. It can involve dumping files to paper or just stealing reports and tapes.

a. Data Leakage
b. Wire Tapping
c. Data Tapping
d. None of the above

Answer: A. Data Leakage

2. It is eavesdropping on information being transmitted over communication lines.


a. Data Leakage
b. Wire Tapping
c. Data Tapping
d. None of the above

Answer: B. Wire Tapping

3. It is a malicious or fraudulent code in an authorized or falsely authorized program.


a. Virus
b. Backdoors
c. Worms
d. Logic Bombs

Answer: B. Backdoors

4. It causes the insertion of malicious code into other executable code.


a. Virus
b. Backdoors
c. Worms
d. Logic Bombs

Answer: A. Virus

5. These are destructive programs that destroy data.


a. Virus
b. Backdoors
c. Worms
d. Logic Bombs

Answer: C. Worms

6. These are Programs that do not self-replicate but rather are programed to detonate.
a. Virus
b. Backdoors
c. Worms
d. Logic Bombs

Answer: D. Logic Bombs


7. Wire driving ___________.
a. Involves the unauthorized use of resources.
b. Involves receiving wireless data from a laptop.
c. Disrupts or denies legitimate user services to a particular are or network.
d. None of the above.

Answer: B. Involves receiving wireless data from a laptop.

8. Vigie wants to make sure that her system is designed in a manner that allows tracing
actions to an individual. Which phase of access control is Vigie concerned about?
a. Identification
b. Authentication
c. Authorization
d. Accountability

Answer: D. Accountability

9. During which phase access control does the system answer the question “Where can
the requestor access?”
a. Identification
b. Authentication
c. Authorization
d. Accountability

Answer: C. Authorization

10. Which type of authentication includes smart cards?


a. Knowledge
b. Ownership
c. Location
d. Action

Answer: B. Ownership

11. It is the central part of a computing environment’s hardware, software and firmware that
enforces access control.
a. Security Kernel
b. CPU
c. Memory
d. Motherboard
Answer: A. Security Kernel

12. Which one of the following is an example of logical access control?


a. Key for a Lock
b. Password
c. Access Card
d. Fence
Answer: B. Password

13. Firewall examines each _________ that are entering or leaving the internal network.
a. Email Users
b. Updates
c. Connections
d. Data Packets

Answer: D. Data Packets

14. It begins from outer rationale to figure out which password variety might be destined to
succeed, and afterward proceeds with the simple way to deal with attempt numerous
potential varieties.
a. Reverse brute force attack
b. Simple brute force attack
c. Hybrid brute force attack
d. Credential Stuffing

Answer: C. Hybrid Brute Force Attack

15. In Los Angeles, in October 1998, district attorneys charged four men with fraud for
allegedly installing computer chips in gasoline pumps that cheated consumers by
overstating the amounts pumped. This attack is commonly known as _____
a. Brute Force Attack
b. Salami Technique
c. Social Engineering
d. Spoofing
Answer: B. Salami Technique
16. I. Email spamming refers to sending email to thousands and thousands of users –
similar to a chain letter.
II. Spoofing is a psychological manipulation of people into performing actions or
divulging confidential information. 

a. Statement 1 is true.
b. Statement 2 is true.
c. Both statements are true.
d. Both Statements are false.
Answer: A. Statement 1 is true
17. Where do most attacks on an organization’s computer resources originate?
a. From the internet
b. From inside the network
c. From universities
d. From intruders who gain physical access to the computer resources
Answer: B. From inside the network
18. It is the fraudulent practice of sending emails purporting to be from reputable companies
in order to reveal personal information, such as passwords, and credit numbers.
a. Quad Pro Quo
b. Phishing
c. Tailgaiting
d. Baiting
Answer: B. Phishing
19. These are the following types of Social engineering except
a. Quad Pro Quo
b. Phishing
c. Tailgaiting
d. Baiting
Answer: A. Quad Pro Quo
20. It is also known as an exhaustive search, is a cryptographic hack that relies on guessing
possible combinations of a targeted password until the correct password is discovered.
a. Salami attack
b. Brute Force attack
c. Social Engineering
d. Spoofing
Answer: B. Brute Force Attack

You might also like