Free Essay

Princiles of Security

In:

Submitted By
Words 669
Pages 3
Matthew Quillman (username: matthew.quillman)

Attempt 1
Written: Sep 20, 2015 4:55 PM - Sep 20, 2015 5:44 PM
Submission View
Question 1 2 / 2 points
An overflowing of water into a data center can cause direct damage to all or part of the information system. A) True

B) False

Question 2 2 / 2 points
A mail bomb is a form of DoS. A) True

B) False

Question 3 2 / 2 points
A timing attack involves interception and analysis of cryptographic elements to determine keys and encryption algorithms. A) True

B) False

Question 4 2 / 2 points
A firewall is a device that keeps certain kinds of network traffic out of a private network. A) True

B) False

Question 5 2 / 2 points
Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. A) True

B) False

Question 6 2 / 2 points
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization. A) SSL

B) PKI

C) PKC

D) SIS

Question 7 2 / 2 points
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A) bypass

B) nature

C) trespass

D) security

Question 8 2 / 2 points
There are generally two skill levels among hackers: expert and ____. A) novice

B) journeyman

C) packet monkey

D) professional

Question 9 2 / 2 points
____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents." A) Infoterrorism

B) Cyberterrorism

C) Hacking

D) Cracking

Question 10 2 / 2 points
____ are software programs that hide their true nature, and reveal their designed behavior only when activated. A) Viruses

B) Worms

C) Spam

D) Trojan horses

Question 11 2 / 2 points
Which of the following is an example of a Trojan horse program? A) Netsky

B) MyDoom

C) Klez

D) Happy99.exe

Question 12 2 / 2 points
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving ____. A) false alarms

B) power faults

C) hoaxes

D) urban legends

Question 13 2 / 2 points
Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____. A) SSL

B) SLA

C) MSL

D) MIN

Question 14 2 / 2 points
In a(n) ____ attack, the attacker sends a large number of connection or information requests to a target. A) denial-of-service

B) distributed denial-of-service

C) virus

D) spam

Question 15 2 / 2 points
A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A) denial-of-service

B) distributed denial-of-service

C) virus

D) spam

Question 16 2 / 2 points
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack. A) Drones

B) Helpers

C) Zombies

D) Servants

Question 17 2 / 2 points
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. A) zombie-in-the-middle

B) sniff-in-the-middle

C) server-in-the-middle

D) man-in-the-middle

Question 18 2 / 2 points
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. A) WWW

B) TCP

C) FTP

D) HTTP

Question 19 2 / 2 points
“4-1-9” fraud is an example of a(n) ____ attack. A) social engineering

B) virus

C) worm

D) spam

Question 20 2 / 2 points
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0, the browser will crash. A) 64

Overall Grade (first attempt): 40 / 40 - 100 %