QUESTIONS AND ANSWERS
The ____________________ data file contains the hashed representation of the user's
password.
Select one:
a.
SAM
b.
FBI
c.
SNMP
d.
SLA - Answer-a.
SAM
In a ____________________ attack, the attacker sends a large number of connection
or information requests to disrupt a target from a small number of sources.
Select one:
a.
denial-of-service
b.
virus
c.
distributed denial-of-service
d.
spam - Answer-a.
denial-of-service
An advance-fee fraud attack involves the interception of cryptographic elements to
determine keys and encryption algorithms.
Select one:
True
False - Answer-False
,A sniffer program can reveal data transmitted on a network segment including
passwords, the embedded and attached files-such as word-processing documents-and
sensitive data transmitted to or from applications.
Select one:
True
False - Answer-True
A(n) polymorphic threat is one that over time changes the way it appears to antivirus
software programs, making it undetectable by techniques that look for preconfigured
signatures. _________________________
Select one:
True
False - Answer-True
Web hosting services are usually arranged with an agreement defining minimum service
levels known as a(n) ____.
Select one:
a.
MIN
b.
MSL
c.
SLA
d.
SSL - Answer-c.
SLA
____________________ is the premeditated, politically motivated attacks against
information, computer systems, computer programs, and data which result in violence
against noncombatant targets by subnational groups or clandestine agents.
Select one:
a.
infoterrorism
b.
cyberterrorism
c.
hacking
d.
cracking - Answer-b.
cyberterrorism
"4-1-9" fraud is an example of a ____________________ attack.
Select one:
a.
social engineering
b.
,spam
c.
virus
d.
worm - Answer-a.
social engineering
Employees are not deterred by the potential loss of certification or professional
accreditation resulting from a breach of a code of conduct as this loss has no effect on
employees' marketability and earning power.
Select one:
True
False - Answer-False
In a study on software license infringement, those from United States were significantly
more permissive than those from the Netherlands and other countries.
_________________________
Select one:
True
False - Answer-False
Studies on ethics and computer use reveal that people of different nationalities have
different perspectives; difficulties arise when one nationality's ethical behavior violates
the ethics of another national group.
Select one:
True
False - Answer-True
Which of the following acts defines and formalizes laws to counter threats from
computer related acts and offenses?
Select one:
a.
Computer Fraud and Abuse Act of 1986
b.
Freedom of Information Act (FOIA) of 1966
c.
Electronic Communications Privacy Act of 1986
d.
Federal Privacy Act of 1974 - Answer-a.
Computer Fraud and Abuse Act of 1986
For policy to become enforceable it only needs to be distributed, read, understood, and
agreed to.
Select one:
True
False - Answer-False
, An information system is the entire set of __________, people, procedures, and
networks that make possible the use of information resources in the organization.
Select one:
a.
data
b.
software
c.
hardware
d.
All of the above - Answer-d.
All of the above
Applications systems developed within the framework of the traditional SDLC are
designed to anticipate a software attack that requires some degree of application
reconstruction.
Select one:
True
False - Answer-False
Part of the logical design phase of the SecSDLC is planning for partial or catastrophic
loss. ____ dictates what immediate steps are taken when an attack occurs.
Select one:
a.
Security response
b.
Continuity planning
c.
Disaster recovery
d.
Incident response - Answer-d.
Incident response
__________ security addresses the issues necessary to protect the tangible items,
objects, or areas of an organization from unauthorized access and misuse.
Select one:
a.
Object
b.
Personal
c.
Physical
d.