Free Essay

Princiles of Security

In:

Submitted By Quillman45
Words 669
Pages 3
Matthew Quillman (username: matthew.quillman)

Attempt 1
Written: Sep 20, 2015 4:55 PM - Sep 20, 2015 5:44 PM
Submission View
Question 1 2 / 2 points
An overflowing of water into a data center can cause direct damage to all or part of the information system. A) True

B) False

Question 2 2 / 2 points
A mail bomb is a form of DoS. A) True

B) False

Question 3 2 / 2 points
A timing attack involves interception and analysis of cryptographic elements to determine keys and encryption algorithms. A) True

B) False

Question 4 2 / 2 points
A firewall is a device that keeps certain kinds of network traffic out of a private network. A) True

B) False

Question 5 2 / 2 points
Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. A) True

B) False

Question 6 2 / 2 points
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization. A) SSL

B) PKI

C) PKC

D) SIS

Question 7 2 / 2 points
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A) bypass

B) nature

C) trespass

D) security

Question 8 2 / 2 points
There are generally two skill levels among hackers: expert and ____. A) novice

B) journeyman

C) packet monkey

D) professional

Question 9 2 / 2 points
____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents." A) Infoterrorism

B) Cyberterrorism

C) Hacking

D) Cracking

Question 10 2 / 2 points
____ are software programs that hide their true nature, and reveal their designed behavior only when activated. A) Viruses

B) Worms

C) Spam

D) Trojan horses

Question 11 2 / 2 points
Which of the following is an example of a Trojan horse program? A) Netsky

B) MyDoom

C) Klez

D) Happy99.exe

Question 12 2 / 2 points
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving ____. A) false alarms

B) power faults

C) hoaxes

D) urban legends

Question 13 2 / 2 points
Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____. A) SSL

B) SLA

C) MSL

D) MIN

Question 14 2 / 2 points
In a(n) ____ attack, the attacker sends a large number of connection or information requests to a target. A) denial-of-service

B) distributed denial-of-service

C) virus

D) spam

Question 15 2 / 2 points
A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A) denial-of-service

B) distributed denial-of-service

C) virus

D) spam

Question 16 2 / 2 points
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack. A) Drones

B) Helpers

C) Zombies

D) Servants

Question 17 2 / 2 points
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. A) zombie-in-the-middle

B) sniff-in-the-middle

C) server-in-the-middle

D) man-in-the-middle

Question 18 2 / 2 points
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. A) WWW

B) TCP

C) FTP

D) HTTP

Question 19 2 / 2 points
“4-1-9” fraud is an example of a(n) ____ attack. A) social engineering

B) virus

C) worm

D) spam

Question 20 2 / 2 points
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0, the browser will crash. A) 64

Overall Grade (first attempt): 40 / 40 - 100 %

Similar Documents

Premium Essay

Scientific Managament

...Report 1 Throughout the history of managamnet, we have had many theorists who have tried to improve managamnet strategies, thus imrove efficiency and effectivness. From the pinoeers of managamnet, like Robert Own and Charles Babbage, through the time of classical managamnet, to scientific managamnet and other contemporary theories, we have had many people with different ideas and strategies on how to imrove the managamnet of the company. This research will concentrate on the work of one of the scientific managamnet theorists, Douglas McGregor. Scientifc managamnt is a type of managamnet that emphasizes on workflows and specifically on labor productivity. Managers in this period have made a significant influence on managamnet as a whole, since this was the first time managament was considered a science. Frederic Taylor, who is considered to be the father of scientific managament, started developing scietific managament in 1880's. After his theories became famous, there were many more followers of scientific managamanet and many other theorists, like Douglas McGregor. Douglas McGreorg was born in 1906, received quality edcuation, peeking with the Ph.D. form Harward University in 1935. (The Economist) He is most famous for his book "The Human Side of Enterprise", thus his theoy of X and Y. McGregor theorizes that management should view the employees' motivation for work in two distinct ways, Theory X and Theory Y. Theory x is authoritative and it assumes that workers naturally...

Words: 590 - Pages: 3

Premium Essay

Economic Growth

...Bangalore University Bachelor of Business Management (New Scheme) SEMESTER SCHEME OF EXAMINATION UNDER SEMESTER : BBM COURSE SEM NO. PAPER NO. 1.1 TITLE OF THE PAPER LECTURE HOURS 04 MARKS UE 90 RM 10 TOTAL MARKS 100 I 1.2 1.3 1.4 1.5 1.6 2.1 II 2.2 2.3 2.4 2.5 2.6 3.1 3.2 3.3 3.4 3.5 3.6 3.7 4.1 4.2 4.3 4.4 4.5 4.6 4.7 5.1 5.2 5.3 5.4 5.5 5.6 III IV V LANGUAGE: KANNADA/SANSKRIT/URDU/TAMIL/ TELUGU/ADDITIONAL ENGLISH/ MARATHI/HINDI ENGLISH BUSINESS ECONOMICS FUNDAMENTALS OF ACCOUNTING BUSINESS MANAGEMENT BUSINESS MATHEMATICS TOTAL LANGUAGE: KANNADA/SANSKRIT/URDU/TAMIL/ TELUGU/ADDITIONAL ENGLISH/ MARATHI/HINDI ENGLISH BUSINESS STATISTICS FINANCIAL ACCOUNTING ORGANISATIONAL BEHAVIOUR BUSINESS ENVIRONMENT TOTAL BUSINESS COMMUNICATION HUMAN RESOURCE MANAGEMENT MARKETING MANAGEMENT CORPORATE ACCOUNTING SERVICES MANAGEMENT INTERNATIONAL BUSINESS INDIAN CONSTITUTION TOTAL BUSINESS RESEARCH METHODS BUSINESS LAW COST ACCOUNTING FINANCIAL MANAGEMENT PRODUCTION & OPERATIONS MANAGEMENT LAW AND PRACTICE OF BANKING COMPUTER FUNDAMENTALS TOTAL INCOME TAX STRATEGIC MANAGEMENT MANAGEMENT ACCOUNTING COMPUTER APPLICATION IN BUSINESS PROJECT MANAGEMENT ENTREPRENEURIAL DEVELOPMENT TOTAL 04 04 04 04 04 24 04 90 90 90 90 90 540 90 10 10 10 10 10 60 10 100 100 100 100 100 600 100 04 04 04 04 04 24 04 04 04 04 04 04 04 28 04 04 04 04 04 04 04 28 04 04 04 04 04 04 24 90 90 90 90 90 540 90 90 90 90 90 90 90 630 90 90 90 90 90 90 90 630 90 90 90 90 90 90 540 10...

Words: 19726 - Pages: 79