Matthew Quillman (username: matthew.quillman)
Attempt 1
Written: Sep 20, 2015 4:55 PM - Sep 20, 2015 5:44 PM
Submission View
Question 1 2 / 2 points
An overflowing of water into a data center can cause direct damage to all or part of the information system. A) True
B) False
Question 2 2 / 2 points
A mail bomb is a form of DoS. A) True
B) False
Question 3 2 / 2 points
A timing attack involves interception and analysis of cryptographic elements to determine keys and encryption algorithms. A) True
B) False
Question 4 2 / 2 points
A firewall is a device that keeps certain kinds of network traffic out of a private network. A) True
B) False
Question 5 2 / 2 points
Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. A) True
B) False
Question 6 2 / 2 points
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization. A) SSL
B) PKI
C) PKC
D) SIS
Question 7 2 / 2 points
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A) bypass
B) nature
C) trespass
D) security
Question 8 2 / 2 points
There are generally two skill levels among hackers: expert and ____. A) novice
B) journeyman
C) packet monkey
D) professional
Question 9 2 / 2 points
____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents." A) Infoterrorism
B) Cyberterrorism
C) Hacking
D) Cracking
Question 10 2 / 2 points
____ are software programs that hide their true nature, and reveal their designed behavior only when activated. A) Viruses
B) Worms
C) Spam
D) Trojan horses
Question 11 2 / 2 points
Which of the following is an example of a Trojan horse program? A) Netsky
B) MyDoom
C) Klez
D) Happy99.exe
Question 12 2 / 2 points
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving ____. A) false alarms
B) power faults
C) hoaxes
D) urban legends
Question 13 2 / 2 points
Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____. A) SSL
B) SLA
C) MSL
D) MIN
Question 14 2 / 2 points
In a(n) ____ attack, the attacker sends a large number of connection or information requests to a target. A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam
Question 15 2 / 2 points
A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam
Question 16 2 / 2 points
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack. A) Drones
B) Helpers
C) Zombies
D) Servants
Question 17 2 / 2 points
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle
Question 18 2 / 2 points
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. A) WWW
B) TCP
C) FTP
D) HTTP
Question 19 2 / 2 points
“4-1-9” fraud is an example of a(n) ____ attack. A) social engineering
B) virus
C) worm
D) spam
Question 20 2 / 2 points
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0, the browser will crash. A) 64
Overall Grade (first attempt): 40 / 40 - 100 %