Answers 100% Pass
4) If an attacker breaks into a corporate database and deletes critical files, this is a attack
against the ________ security goal.
A) integrity
B) confidentiality
C) Both A and B
D) Neither A nor B - ✔✔A
6) When a threat succeeds in causing harm to a business, this is called a ________.
A) breach
B) compromise
C) incident
D) All of the above - ✔✔D
9) Which of the following is a type of countermeasure?
A) Detective
Brittie Donald, All Rights Reserved © 2025 1
,B) Corrective
C) Both A and B
D) Neither A nor B - ✔✔C
12) Detective countermeasures keep attacks from succeeding. - ✔✔FALSE
32) When considering penalties for hacking, motivation is irrelevant. - ✔✔TRUE
35) The terms "intellectual property" and "trade secret" are synonymous. - ✔✔FALSE
41) ________ are programs that attach themselves to legitimate programs.
A) Viruses
B) Worms
C) Both A and B
D) Neither A nor B - ✔✔A
52) Rootkits replace legitimate programs and are considered a deeper threat than a set
of programs called Trojan horses. - ✔✔FALSE
53) Which type of program can hide itself from normal inspection and detection?
A) Trojan horse
B) Stealth Trojan
Brittie Donald, All Rights Reserved © 2025 2
, C) Spyware
D) Rootkit - ✔✔D
54) Mobile code usually is delivered through ________.
A) webpages
B) e-mail
C) directly propagating worms
D) All of the above - ✔✔A
65) In response to a chain of attack, victims can often trace the attack back to the final
attack computer. - ✔✔TRUE
68) Attackers cannot use IP address spoofing in port scanning attack packets. -
✔✔TRUE
69) The primary purpose for attackers to send port scanning probes to hosts is to
identify which ports are open. - ✔✔FALSE
70) To obtain IP addresses through reconnaissance, an attacker can use ________.
A) IP address spoofing
B) a chain of attack computers
C) Both A and B
Brittie Donald, All Rights Reserved © 2025 3