Question 1 of 20 | 5.0 Points |
Which of the following refers to a piece of code designed to cause harm that is intentionally inserted into a software system and will activate upon the occurrence of some predetermined data, time, or event? | | A.Logic bomb | | | B.Trojan horse | | | C.Cracker | | | D.Denial of service (DoS) attack | | Answer Key: A | | | Question 2 of 20 | 5.0 Points |
Denial of service (DoS) and distributed denial of service (DDoS) attacks have the same effect, however a distributed denial of service (DDos) attack: | | A.involves accessing a system of computers without authorization. | | | B.is launched from large numbers of hosts that have been compromised and act after receiving a particular command. | | | C.involves intentional deception designed to produce illegal financial gain or to damage another party. | | | D.is software written with a deliberate purpose to cause damage, destruction, or disruption. | | Answer Key: B | | | Question 3 of 20 | 5.0 Points |
While “hacker” has become a universal term for people who break the law or break into systems without authorization, these people are more correctly known as: | | A.embezzlers | | | B.exploiters | | | C.white-hat hackers. | | | D.crackers | | Answer Key: D | | | Question 4 of 20 | 5.0 Points |
Which of the following refers to a piece of software, a tool, or a technique that targets or takes advantage of a vulnerability? | | A.Asset | | | B.Authentication | | | C.Exploit | | | D.Hacker | | Answer Key: C | | | Question 5 of 20 | 5.0 Points |
Which of the following is NOT considered one of the three types of controls you can use in risk mitigation? | | A.Physical | | | B.Distribution | | | C.Technical | | | D.Administrative | | Answer Key: B | | |