SEC 311 Week 1 Quiz (answered) complete graded 100% already 2021
SEC 311 Week_1_Quiz (TCO 1) What is the main federal statute that addresses computer hacking? Section 1028 Section 1029 Section 2510 Section 2701 Section 1029, Fraud and related activity with access devices: This law gives the U.S. federal government the power to prosecute hackers who knowingly and with intent to defraud produce use, or traffic in one or more counterfeit access devices. Access devices can be an application or hardware that is created specifically to generate any type of access credentials, including passwords, credit card numbers, long-distance telephone service access codes, PINs, and so on for the purpose of unauthorized access. (TCO 1) Which of the following addresses the secrecy and privacy of information? Nonrepudiation Integrity checks Credential checking None of the above Chapter 1, page 6. Confidentiality addresses the secrecy and privacy of information. Physical examples of confidentiality include locked doors, armed guards, and fences. In the logical world, confidentiality must protect data in storage and in transit. Question 1 3 / 3 pts Question 2 3 / 3 ptsQuestion 3 3 / 3 pts (TCO 1) Which individuals believe that hacking and defacing websites can promote social change? Ethical hackers White hat hackers Black hat hackers Hacktivists Hacktivists seek to promote social change; they believe that defacing websites and hacking servers is acceptable as long as it promotes their goals. Regardless of their motives, hacking remains illegal, and they are subject to the same computer crime laws as any other criminal. Answer A is incorrect because ethical hackers work within the boundaries of laws and ethics. Answer B is incorrect because gray hat hackers are those individuals who cross the line between legal and questionable behavior. Answer C is incorrect because black hat hackers are criminal hackers and might be motivated to perform illegal activities for many different reasons. (TCO 1) Attackers (hackers) are . phreakers script kiddies disgruntled employees All of the above Chapter 1, page 15. Question 4 3 / 3 ptsQuestion 5 3 / 3 pts (TCO 5) Which of the following is the most important step for an ethical hacker to perform during the pre-assessment? Hack the gateway to the Internet Obtain written permission to hack. Seek legal advice Research for different types of attacks on the Internet Obtain written permission to hack. Ethical hackers must always obtain legal, written permission before beginning any security tests. (TCO 6) What are the three axioms that form the data security triad? Hack, fix and learn Confidentiality, integrity, and availability Deter, fix, and hack Monitor, discover, and alert Chapter 1 and lecture Question 6 3 / 3 ptsQuestion 7 3 / 3 pts (TCO 2) The A in OCTAVE stands for Asset Assist Authentication Availability Chapter 2 and lecture Operationally Critical Threat, Asset, and Vulnerability Evaluation (TCO 2) At what layer of the OSI model does a SYN attack occur? Application Session Transport Data link Chapter 2 and lecture Question 8 3 / 3 ptsQuestion 9 3 / 3 pts (TCO 2) What flag sequence is set in a TCP packet to terminate an abnormal transmission? RPT FIN PSH FIN RST Chapter 2 and lecture (TCO 2) Which DNS record gives information about the zone, such as administrator contact, and so on? CNAME MX record A record Start of authority The Start of Authority record gives information about the zone, such as the administrator contact. Question 10 3 / 3 pts
Written for
- Institution
-
Devry University
- Course
-
SEC 311 Week 1 (SEC311)
Document information
- Uploaded on
- December 7, 2021
- Number of pages
- 6
- Written in
- 2021/2022
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- sec 311 week 1 quiz
-
sec 311week1
-
tco 1 what is the main federal statute that addresses computer hacking
-
which of the following addresses the secrecy and privacy of information
Also available in package deal