Week One
1. Are there any reasons not to take an extreme view of security if that view errs on the
side of caution?
a. No, there is no reason not to take such an extreme view
b. Yes, that can lead to wasting on threats that are not likely
c. Yes, if you're going to err, assume there are few if any realistic threats
d. Yes, that can require that you increase your security skills in order to implement
more rigorous defenses
2. Which of the following is the most accurate definition of a virus?
a. Any program that spreads via e-mail
b. Any program that carries a malicious payload
c. Any program that attaches malicious code to a legitimate file or program, causing
harm and spreading when the infected file is executed
d. Any program that self-replicates
3. Blocking attacks seek to accomplish what?
a. Install a virus on the target machine
b. Shut down security measures
c. Prevent legitimate users from accessing a system
d. Break into a target system
4. Which of the following is the best definition for war-driving?
a. Driving while hacking and seeking a computer job
b. Driving while using a wireless connection to hack
c. Driving looking for wireless networks to hack
d. Driving and seeking rival hackers
5. Which of the following is the best definition of malware?
a. Software that has some malicious purpose
b. Software that self-replicates
c. Software that damages your system
d. Any software that is not properly configured for your system
6. Which of the following gives the best definition of spyware?
a. Any software that logs keystrokes
b. Any software used to gather intelligence
c. Any software or hardware that monitors your system
d. Any software that monitors which websites you visit
7. Which of the following is not one of the three major classes of threats?
a. Denial of service attacks
, b. A computer virus or worm
c. Actually intruding on a system
d. Online auction fraud
8. When assessing threats to a system, what three factors should you consider?
a. The system’s attractiveness, the information contained on the system, and how
much traffic the system gets
b. The skill level of the security team, the systems of attractiveness, and how much
traffic the system gets
c. How much traffic the system gets, the security budget, and the skill level of the
security team
d. The system's attractiveness, the information contained on the system, and the
security budget
9. Which of the following best defines the primary difference between an ethical hacker
and an auditor?
a. There is no difference
b. The ethical hacker tends to be less skilled
c. The auditor tends to be less skilled
d. The ethical hacker tends to use more unconventional methods
10. Which of the following is the best definition for non-repudiation?
a. Security that does not allow the potential intruder to deny his attack
b. Processes that verify which user performs what action
c. It is another term for user authentication
d. Access control
11. An intrusion-detection system is an example of:
a. Proactive security
b. Perimeter security
c. Hybrid security
d. Good security practices
12. Which of the following is the most basic security activity?
a. Installing a firewall
b. Authenticating users
c. Controlling access to resources
d. Using a virus scanner
13. What is the term for hacking a phone system?
a. Telco-hacking
b. Hacking
c. Cracking
d. Phreaking
, 14. Which of the following is the best definition for the term ethical hacker?
a. An amateur who hacks a system without being caught
b. A person who hacks a system by faking A legitimate password
c. A person who hacks a system to test its vulnerabilities
d. An amateur hacker
15. The most desirable approach to security is one which is:
a. Perimeter and dynamic
b. Layered and dynamic
c. Perimeter and static
d. Layered and static
16. What are the three approaches to security?
a. Perimeter, layered, and hybrid
b. High security, medium security, and low security
c. Internal, external, and hybrid
d. Perimeter, complete, and none
17. Which of the following is the best definition of “sensitive information”?
a. Military- or defense-related information
b. Any information that is worth more than $1000
c. Any information that, if accessed by unauthorized personnel, could damage your
organization in any way
d. Any information that has monetary value and is protected by any privacy laws
18. Which of the following types of privacy laws affect computer security?
a. Any state privacy law
b. Any privacy law applicable to your organization
c. Any privacy law
d. Any federal privacy law
19. Which of the following would most likely be classified as misuse(s) of systems?
a. Looking up information on a competitor using the web
b. Getting an occasional personal e-mail
c. Using your business computer to conduct your own (non-company) business
d. Shopping on the web during lunch
20. The first computer incident response team is affiliated with what university?
a. Princeton University
b. Carnegie-Mellon University
c. Harvard University
d. Yale university
21. What kind of risk assessment is most likely to follow a serious security incident?
a. Ad hoc