B - Correct Answers DES - Data Encryp on standard has a 128 bit key and is very difficult to
break.
A. True
B. False
B - Correct Answers What is the main difference between computer abuse and computer
crime?
A. Amount of damage
B. Inten ons of the perpetrator
C. Method of compromise
D. Abuse = company insider; crime = company outsider
C - Correct Answers A standardized list of the most common security weaknesses and exploits
is the __________.
A. SANS Top 10
B. CSI/FBI Computer Crime Study
C. CVE - Common Vulnerabili es and Exposures
D. CERT Top 10
C - Correct Answers A salami a6ack refers to what type of ac vity?
A. Embedding or hiding data inside of a legi mate communica on - a picture, etc.
,B. Hijacking a session and stealing passwords
C. Commi:ng computer crimes in such small doses that they almost go unno ced
D. Se:ng a program to a6ack a website at11:59 am on New Year's Eve
D - Correct Answers Mul -par te viruses perform which func ons?
A. Infect mul ple par ons
B. Infect mul ple boot sectors
C. Infect numerous worksta ons
D. Combine both boot and file virus behavior
B - Correct Answers What security principle is based on the division of job responsibili es -
designed to prevent fraud?
A. Mandatory Access Control
B. Separa on of Du es
C. Informa on Systems Audi ng
D. Concept of Least Privilege
A - Correct Answers ________ is the authorita ve en ty which lists port assignments
A. IANA
B. ISSA
C. Network Solu ons
D. Register.com
E. InterNIC
,B - Correct Answers Cable modems are less secure than DSL connec ons because cable
modems are shared with
other subscribers?
A. True
B. False
D - Correct Answers ____________ is a file system that was poorly designed and has
numerous security flaws.
A. NTS
B. RPC
C. TCP
D. NFS
E. None of the above
Log files - Correct Answers Trend Analysis involves analyzing historical ___________ files in
order to look for pa6erns of
abuse or misuse.
D - Correct Answers HTTP, FTP, SMTP reside at which layer of the OSI model?
A. Layer 1 - Physical
B. Layer 3 - Network
C. Layer 4 - Transport
D. Layer 7 - Applica on
, E. Layer 2 - Data Link
D - Correct Answers Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
A. Layer 7 - Applica on Layer
B. Layers 2, 3, & 4 - Data Link, Network, and Transport Layers
C. Layer 3 - Network Layer
D. Layers 5, 6, & 7 - Session, Presenta on, and Applica on Layers
B - Correct Answers A Security Reference Monitor relates to which DoD security standard?
A. LC3
B. C2
C. D1
D. L2TP
E. None of the items listed
D - Correct Answers The ability to iden fy and audit a user and his / her ac ons is known as
____________.
A. Journaling
B. Audi ng
C. Accessibility
D. Accountability
E. Forensics