Exam 1: Introduction to Computer Security
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
Someone who gains access to a system and causes harm is a __________?
Free
(Multiple Choice)
4.8/5
(22)
Correct Answer:
B
A(n)______ is a basic security device that filters traffic and is a barrier between a network and the outside world or between a system and other systems.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
A
The type of hacking that involves breaking into telephone systems is called sneaking.
Free
(True/False)
4.9/5
(43)
Correct Answer:
False
The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems,conduct computer security training,and develop computer security plans.
(True/False)
4.9/5
(29)
Confidentiality,integrity,and availability are three pillars of the CIA triangle.
(True/False)
4.8/5
(27)
Malware is a generic term for software that has a malicious purpose.
(True/False)
4.9/5
(35)
Which of these is a repository for detailed information on virus outbreaks?
(Multiple Choice)
4.9/5
(32)
The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand.
(True/False)
4.8/5
(37)
Which of these is a repository of security-related documentation and also sponsors a number of security research projects?
(Multiple Choice)
4.9/5
(39)
Your company is instituting a new security awareness program.You are responsible for educating end users on a variety of threats,including social engineering.Which of the following best defines social engineering?
(Multiple Choice)
4.8/5
(51)
The technique for breaching a system's security by exploiting human nature rather than technology is war-driving.
(True/False)
4.9/5
(31)
Someone who finds a flaw in a system and reports that flaw to the vendor of the system is a __________.
(Multiple Choice)
4.8/5
(32)
Which of these was the first computer incident-response team?
(Multiple Choice)
4.9/5
(30)
Software that lays dormant until some specific condition is met is a Trojan horse.
(True/False)
4.8/5
(32)
A(n)hides the internal network's IP address and presents a single IP address to the outside world.
(Multiple Choice)
4.9/5
(33)
Someone who legally breaks into a system to assess security deficiencies is a ________.
(Multiple Choice)
4.8/5
(34)
Someone who calls himself a hacker but lacks the expertise is a ________.
(Multiple Choice)
4.8/5
(41)
Someone who breaks into a system legally to assess security deficiencies is a sneaker.
(True/False)
4.7/5
(32)
Auditing is the process to determine if a user's credentials are authorized to access a network resource.
(True/False)
4.8/5
(32)
In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 24
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)