CYBER SECURITY QUALIFIED QUESTIONS AND ANSWERS #1
Instant Message - correct answer Common communication using a computer
ICMP - correct answer Internet Control Message Protocol. Used by a router to exchange
information with other routers
Configuration Management - correct answer The process of keeping track of changes to the
system, if needed, approving them.
Packet Sniffer - correct answer A device or program that monitors the data traveling between
computers on a network
Gateway - correct answer A bridge two networks
Keywords - correct answer will block any website that to deal with certain predetermined
keywords
Risk Analysis - correct answer The process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards
Packet Filtering or Packet Purity - correct answer analyzed against a set of filters. That make it
through the filters are sent to the requesting system and others are discarded
Telnet - correct answer used to perform commands on a remote computers
Spyware - correct answer any software using someone's Internet connection in the background
without their knowledge or explicit permission. These applications are typically bundled as a
hidden component of freeware or shareware programs that can be downloaded from the
Internet; however, it should be noted that majority of shareware and freeware do not come
with this. Once installed, this monitors user activity on the Internet and transmits that
ATTEMPT ALL QUESTIONS
, information in the background to someone else. IT can also gather information about e-mail
addresses and even passwords and credit card numbers.
SMTP Session Hijacking - correct answer by gaining access to a list of e-mail addresses a person
can send spam to thousands of users
Distributed Tool - correct answer A tool that can be distributed to multiple hosts, which can
then be coordinated to anonymously perform an attack on the target host simultaneously after
some time delay
Operation Controls - correct answer Security methods that focus on mechanisms that primarily
are implemented and executed by people (as opposed to systems)
Encryptions - correct answer the translation of data into a secret code; the most effective way
to achieve data security. To read these files, you must have access to a secret key or password
that enables you to decrypt it
Audit Trail - correct answer A record showing who has accessed a computer system and what
operations he or she has performed during a given period of time. Useful both for maintaining
security and for recovering lost transactions
Mobile Code - correct answer Software moduels obtained from remote systems, transferred
across a network, and then downloaded and executed on a local system without explicit
installation or execution by the recipient, Malicious types of this are designed, employed,
distributed, or activated with the intention of compromising the performance or security of
information systems and computers, increasing access to those systems disclosing unauthorized
information, corrupting information, denying service, or stealing resources.
Data Integrity - correct answer The state that exists when automated data is the same as that
in source documents, or has been correctly computed from source data, and has not been
exposed to alteration or destruction
ATTEMPT ALL QUESTIONS
Instant Message - correct answer Common communication using a computer
ICMP - correct answer Internet Control Message Protocol. Used by a router to exchange
information with other routers
Configuration Management - correct answer The process of keeping track of changes to the
system, if needed, approving them.
Packet Sniffer - correct answer A device or program that monitors the data traveling between
computers on a network
Gateway - correct answer A bridge two networks
Keywords - correct answer will block any website that to deal with certain predetermined
keywords
Risk Analysis - correct answer The process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards
Packet Filtering or Packet Purity - correct answer analyzed against a set of filters. That make it
through the filters are sent to the requesting system and others are discarded
Telnet - correct answer used to perform commands on a remote computers
Spyware - correct answer any software using someone's Internet connection in the background
without their knowledge or explicit permission. These applications are typically bundled as a
hidden component of freeware or shareware programs that can be downloaded from the
Internet; however, it should be noted that majority of shareware and freeware do not come
with this. Once installed, this monitors user activity on the Internet and transmits that
ATTEMPT ALL QUESTIONS
, information in the background to someone else. IT can also gather information about e-mail
addresses and even passwords and credit card numbers.
SMTP Session Hijacking - correct answer by gaining access to a list of e-mail addresses a person
can send spam to thousands of users
Distributed Tool - correct answer A tool that can be distributed to multiple hosts, which can
then be coordinated to anonymously perform an attack on the target host simultaneously after
some time delay
Operation Controls - correct answer Security methods that focus on mechanisms that primarily
are implemented and executed by people (as opposed to systems)
Encryptions - correct answer the translation of data into a secret code; the most effective way
to achieve data security. To read these files, you must have access to a secret key or password
that enables you to decrypt it
Audit Trail - correct answer A record showing who has accessed a computer system and what
operations he or she has performed during a given period of time. Useful both for maintaining
security and for recovering lost transactions
Mobile Code - correct answer Software moduels obtained from remote systems, transferred
across a network, and then downloaded and executed on a local system without explicit
installation or execution by the recipient, Malicious types of this are designed, employed,
distributed, or activated with the intention of compromising the performance or security of
information systems and computers, increasing access to those systems disclosing unauthorized
information, corrupting information, denying service, or stealing resources.
Data Integrity - correct answer The state that exists when automated data is the same as that
in source documents, or has been correctly computed from source data, and has not been
exposed to alteration or destruction
ATTEMPT ALL QUESTIONS