midterm

31
Josh Mena Update profile My courses Logout Tuesday 21 June 2011 You are here Barry University / IT320WD1102 / Quizzes / Midterm Exam / Review of attempt 1 Midterm Exam Review of attempt 1 Top of Form Finis h review Bottom of Form Started on Tuesday, 21 June 2011, 05:24 PM Completed on Tuesday, 21 June 2011, 05:52 PM Time taken 28 mins 12 secs Marks 67/70

Upload: liliam-luque

Post on 27-Nov-2014

347 views

Category:

Documents


6 download

TRANSCRIPT

Page 2: Midterm

Grade 33.5 out of a maximum of 35 (96%)

Question 1

Marks: 1

____ involves using someone’s personal information, such as social security numbers, to establish bank

or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their

credit rating.

Choose one answer.

a. Cyberterrorism

b. Identity theft

c. Phishing

d. Scam

Correct

Marks for this submission: 1/1.

Question 2

Marks: 1

In a general sense, security is defined as a state of freedom from danger or risk.

Answer:

True False

Incorrect

Marks for this submission: 0/1.

Question 3

Marks: 1

SMTP servers can forward e-mail sent from an e-mail client to a remote domain. This is known as ____.

Choose one answer.

Page 3: Midterm

a. SMTP relay

b. IMAP

c. Spam

d. Spam relay

Correct

Marks for this submission: 1/1.

Question 4

Marks: 1

Flash memory is a type of ____, nonvolatile computer memory that can be electrically erased and

rewritten repeatedly.

Choose one answer.

a. EROM

b. ROM

c. EEPROM

d. RAM

Correct

Marks for this submission: 1/1.

Question 5

Marks: 1

A ____ is a program advertised as performing one activity but actually does something else.

Choose one answer.

a. script

b. virus

Page 4: Midterm

c. Trojan

d. worm

Correct

Marks for this submission: 1/1.

Question 6

Marks: 1

What is another name for unsolicited e-mail messages?

Choose one answer.

a. spam

b. spawn

c. trash

d. scam

Correct

Marks for this submission: 1/1.

Question 7

Marks: 1

The “return address” of a program is the only element that can be altered through a buffer overflow

attack.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 8

Marks: 1

Page 5: Midterm

The loss of employee productivity is the single largest cause of financial loss due to a security breach.

Answer:

True False

Incorrect

Marks for this submission: 0/1.

Question 9

Marks: 1

Regarding e-mail, ____ handles outgoing mail.

Choose one answer.

a. SMTP

b. POP3

c. IMAP

d. SNMP

Correct

Marks for this submission: 1/1.

Question 10

Marks: 1

In a company of 500 employees, it is estimated that _____ employees would be required to combat a

virus attack.

Choose one answer.

a. two

b. five

c. seven

Page 6: Midterm

d. ten

Correct

Marks for this submission: 1/1.

Question 11

Marks: 1

In a “____ attack,” a TCP/IP ping request is sent to all computers on the network, which makes it appear

that a server is asking for a response.

Choose one answer.

a. smurf

b. ping of death

c. frame

d. DNS poisoning

Correct

Marks for this submission: 1/1.

Question 12

Marks: 1

____ is a process of ensuring that any inputs are “clean” and will not corrupt the system.

Choose one answer.

a. Cross-site scripting

b. SQL injection

c. Script injection

d. Input validation

Correct

Marks for this submission: 1/1.

Page 7: Midterm

Question 13

Marks: 1

At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the

necessary information for devices that want to join the network. This process is known as ____.

Choose one answer.

a. beaconing

b. scanning

c. mapping

d. caching

Correct

Marks for this submission: 1/1.

Question 14

Marks: 1

Network devices are commonly protected by passwords to prevent unauthorized users from accessing

the device and changing configuration settings.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 15

Marks: 1

____ is a software program that delivers advertising content in a manner that is unexpected and

unwanted by the user.

Choose one answer.

a. Adware

Page 8: Midterm

b. Keylogger

c. Spam

d. Trojan

Correct

Marks for this submission: 1/1.

Question 16

Marks: 1

Utility companies, telecommunications, and financial services are considered prime targets of

cyberterrorists because they can significantly disrupt business and personal activities by destroying a

few targets.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 17

Marks: 1

The _____ act is designed to broaden the surveillance of law enforcement agencies so they can detect

and suppress terrorism.

Choose one answer.

a. Gramm-Leach-Bliley

b. Sarbanes-Oxley

c. California Database Security Breach

d. USA Patriot

Correct

Marks for this submission: 1/1.

Page 9: Midterm

Question 18

Marks: 1

The ____ are the operating system settings that impose how the policy will be enforced.

Choose one answer.

a. security policies

b. group policies

c. security templates

d. configuration baselines

Correct

Marks for this submission: 1/1.

Question 19

Marks: 1

_____ ensures that only authorized parties can view information.

Choose one answer.

a. Security

b. Availability

c. Integrity

d. Confidentiality

Correct

Marks for this submission: 1/1.

Question 20

Marks: 1

A ____ is a single, dedicated hard disk-based file storage device that provides centralized and

consolidated disk storage available to LAN users through a standard network connection.

Page 10: Midterm

Choose one answer.

a. NAS

b. NSA

c. NSF

d. NFS

Correct

Marks for this submission: 1/1.

Question 21

Marks: 1

The goal of ____ is to make it harder to predict where the operating system functionality resides in

memory.

Choose one answer.

a. DEP

b. ASLR

c. NX

d. ASNX

Correct

Marks for this submission: 1/1.

Question 22

Marks: 1

A computer ____ is a program that secretly attaches itself to a legitimate “carrier,” such as a document

or program, and then executes when that document is opened or program is launched.

Choose one answer.

a. virus

Page 11: Midterm

b. worm

c. adware

d. spyware

Correct

Marks for this submission: 1/1.

Question 23

Marks: 1

With operating system virtualization, a virtual machine is simulated as a self-contained software

environment by the ____ system (the native operating system to the hardware).

Choose one answer.

a. guest

b. host

c. root

d. server

Correct

Marks for this submission: 1/1.

Question 24

Marks: 1

According to the research group Postini, over ____ of daily e-mail messages are unsolicited and could be

carrying a malicious payload.

Choose one answer.

a. one-third

b. two-thirds

Page 12: Midterm

c. three-fourths

d. four-fifths

Correct

Marks for this submission: 1/1.

Question 25

Marks: 1

Targeted attacks against financial networks, unauthorized access to information, and the theft of

personal information is sometimes known as ____.

Choose one answer.

a. spam

b. phishing

c. cybercrime

d. cyberterrorism

Correct

Marks for this submission: 1/1.

Question 26

Marks: 1

____ hinges on an attacker being able to enter an SQL database query into a dynamic Web page.

Choose one answer.

a. XSS

b. SQL injection

c. Script injection

d. Sandboxing

Page 13: Midterm

Correct

Marks for this submission: 1/1.

Question 27

Marks: 1

In information security, a loss can be _____.

Choose one answer.

a. theft of information

b. a delay in transmitting information that results in a financial penalty

c. the loss of good will or a reputation

d. all of the above

Correct

Marks for this submission: 1/1.

Question 28

Marks: 1

The ____ record is an entry in the Domain Name System (DNS) that identifies the mail server responsible

for handling that domain name.

Choose one answer.

a. DEP

b. AX

c. IM

d. MX

Correct

Marks for this submission: 1/1.

Question 29

Page 14: Midterm

Marks: 1

____ technology enables a virtual machine to be moved to a different physical computer with no impact

to the users.

Choose one answer.

a. Live migration

b. Load balancing

c. Operating system virtualization

d. Server virtualization

Correct

Marks for this submission: 1/1.

Question 30

Marks: 1

A(n) ____ is a computer programming language that is typically interpreted into a language the

computer can understand.

Choose one answer.

a. ActiveX control

b. cookie

c. shell

d. scripting language

Correct

Marks for this submission: 1/1.

Question 31

Marks: 1

A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific

logical event.

Page 15: Midterm

Choose one answer.

a. Trojan

b. logic bomb

c. macro virus

d. metamorphic virus

Correct

Marks for this submission: 1/1.

Question 32

Marks: 1

One of the most important steps in hardening an operating system to resist attacks is to apply updates.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 33

Marks: 1

The most common type of antenna for war driving is an omnidirectional antenna, also known as a ____

antenna.

Choose one answer.

a. bipole

b. dipole

c. GPS

d. tagging

Correct

Page 16: Midterm

Marks for this submission: 1/1.

Question 34

Marks: 1

DoS attacks are limited to wired networks and cannot be used against wireless networks.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 35

Marks: 1

The ____ is the link between the cellular network and the wired telephone world and controls all

transmitters and base stations in the cellular network.

Choose one answer.

a. SAN

b. NAS

c. RF cell

d. MTSO

Correct

Marks for this submission: 1/1.

Question 36

Marks: 1

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive

information.

Answer:

True False

Page 17: Midterm

Correct

Marks for this submission: 1/1.

Question 37

Marks: 1

COPPA requires operators of online services or Web sites designed for children under the age of _____

to obtain parental consent prior to the collection, use, disclosure, or display of a child’s personal

information.

Choose one answer.

a. 8

b. 10

c. 13

d. 16

Correct

Marks for this submission: 1/1.

Question 38

Marks: 1

Passive wireless discovery through war driving in itself is an illegal activity.

Answer:

True False

Incorrect

Marks for this submission: 0/1.

Question 39

Marks: 1

DNS poisoning can be prevented by using the latest editions of the DNS software, ____.

Choose one answer.

Page 18: Midterm

a. BIND

b. DNSS

c. IPsec

d. BINDSEC

Correct

Marks for this submission: 1/1.

Question 40

Marks: 1

The most common protocol suite used today for networks as well as the Internet is ____.

Choose one answer.

a. TCP/IP

b. SMTP

c. SNMP

d. DNS

Correct

Marks for this submission: 1/1.

Question 41

Marks: 1

What is the maximum fine for those who wrongfully disclose individually identifiable health information

with the intent to sell it?

Choose one answer.

a. $100,000

b. $250,000

Page 19: Midterm

c. $500,000

d. $1,000,000

Correct

Marks for this submission: 1/1.

Question 42

Marks: 1

Because NAS operates at the file system level, NAS security cannot be implemented through the

standard operating system security features.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 43

Marks: 1

____ involves horizontally separating words, although it is still readable by the human eye.

Choose one answer.

a. Word splitting

b. GIF layering

c. Geometric variance

d. Layer variance

Correct

Marks for this submission: 1/1.

Question 44

Marks: 1

Page 20: Midterm

Under the _____ , healthcare enterprises must guard protected health information and implement

policies and procedures to safeguard it, whether it be in paper or electronic format.

Choose one answer.

a. HIPAA

b. HLPDA

c. HCPA

d. USHIPA

Correct

Marks for this submission: 1/1.

Question 45

Marks: 1

Wireless location mapping is the formal expression for ____.

Choose one answer.

a. wireless scanning

b. wireless caching

c. war driving

d. wireless beaconing

Correct

Marks for this submission: 1/1.

Question 46

Marks: 1

A study by Foote Partners showed that security certifications earn employees ____ percent more pay

than their uncertified counterparts.

Choose one answer.

Page 21: Midterm

a. 10 to 14

b. 12 to 15

c. 13 to 14

d. 14 to 16

Correct

Marks for this submission: 1/1.

Question 47

Marks: 1

In order to avoid detection some viruses can alter how they appear. These are known as ____ viruses.

Choose one answer.

a. macro

b. metamorphic

c. boot

d. companion

Correct

Marks for this submission: 1/1.

Question 48

Marks: 1

As a reaction to a rash of corporate fraud, the Gramm-Leach-Bliley Act (GLBA) is an attempt to fight

corporate corruption.

Answer:

True False

Correct

Marks for this submission: 1/1.

Page 22: Midterm

Question 49

Marks: 1

When TCP/IP was developed, the host table concept was expanded to a hierarchical name system

known as the ____.

Choose one answer.

a. ARPAnet

b. DNS

c. SNMP

d. SMTP

Correct

Marks for this submission: 1/1.

Question 50

Marks: 1

Regarding e-mail, ____ is responsible for incoming mail.

Choose one answer.

a. SMTP

b. IMAP

c. POP3

d. SNMP

Correct

Marks for this submission: 1/1.

Question 51

Marks: 1

Page 23: Midterm

Common network device vulnerabilities include weak passwords, default accounts, back doors, and

privilege escalation.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 52

Marks: 1

A ____ virus can interrupt almost any function executed by the computer operating system and alter it

for its own malicious purposes.

Choose one answer.

a. companion

b. file infector

c. resident

d. boot

Correct

Marks for this submission: 1/1.

Question 53

Marks: 1

According to the 2007 FBI Computer Crime and Security Survey, the loss due to the theft of confidential

data for 494 respondents was approximately ____.

Choose one answer.

a. $1 million

b. $10 million

Page 24: Midterm

c. $50 million

d. $100 million

Correct

Marks for this submission: 1/1.

Question 54

Marks: 1

JavaScript resides inside HTML documents.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 55

Marks: 1

I found this test to be..

Choose one answer.

a. Easy, I could take it with my eyes open.

b. Very Difficult, I was caught up in the Heat Championships and was too mesmorized to study.

c. Easy, I could take it with my eyes closed.

d. Difficult, I just starred at my textbook for the last few weeks.

e. Average, I had to open my textbook and look at it.

Correct

Marks for this submission: 1/1.

Question 56

Page 25: Midterm

Marks: 1

____ uses “speckling” and different colors so that no two spam e-mails appear to be the same.

Choose one answer.

a. GIF layering

b. Geometric variance

c. Word splitting

d. Layer variance

Correct

Marks for this submission: 1/1.

Question 57

Marks: 1

Each wireless device looks for beacon frames in a process known as ____.

Choose one answer.

a. mapping

b. scanning

c. caching

d. beaconing

Correct

Marks for this submission: 1/1.

Question 58

Marks: 1

A(n) ____ attack makes a copy of the transmission before sending it to the recipient.

Choose one answer.

Page 26: Midterm

a. man-in-the-middle

b. replay

c. DNS spoofing

d. ARP poisoning

Correct

Marks for this submission: 1/1.

Question 59

Marks: 1

____ enables the attacker’s computer to forward any network traffic it receives from Computer A to the

actual router.

Choose one answer.

a. IP mirroring

b. Port mirroring

c. IP forwarding

d. Port forwarding

Correct

Marks for this submission: 1/1.

Question 60

Marks: 1

____ is a language used to view and manipulate data that is stored in a relational database.

Choose one answer.

a. CSS

b. XSS

Page 27: Midterm

c. SQL

d. DEP

Correct

Marks for this submission: 1/1.

Question 61

Marks: 1

____ are active Internet connections that download a specific file that is available through a tracker.

Choose one answer.

a. Torrents

b. Applets

c. ActiveX controls

d. Scripts

Correct

Marks for this submission: 1/1.

Question 62

Marks: 1

____ is the name given to a wireless technology that uses short-range RF transmissions.

Choose one answer.

a. Bluetooth

b. Piconet

c. Scatternet

d. Wi-fi

Correct

Page 28: Midterm

Marks for this submission: 1/1.

Question 63

Marks: 1

In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a

single computer or network.

Choose one answer.

a. centered

b. local

c. remote

d. distributed

Correct

Marks for this submission: 1/1.

Question 64

Marks: 1

A group of piconets in which connections exist between different piconets is called a ____.

Choose one answer.

a. shortnet

b. meshnet

c. multinet

d. scatternet

Correct

Marks for this submission: 1/1.

Question 65

Marks: 1

Page 29: Midterm

TCP/IP hijacking is successful because several protocols, such as File Transfer Protocol (FTP) and Telnet,

do not check the source IP addresses of the device from which they receive packets.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 66

Marks: 1

Like Java applets, ActiveX controls also run in a sandbox.

Answer:

True False

Correct

Marks for this submission: 1/1.

Question 67

Marks: 1

One type of virtualization in which an entire operating system environment is simulated is known as

____ virtualization.

Choose one answer.

a. NOS

b. guest

c. operating system

d. host

Correct

Marks for this submission: 1/1.

Question 68

Page 30: Midterm

Marks: 1

One approach to substituting a fraudulent IP address is to target the external DNS server and is called

____.

Choose one answer.

a. DNS spoofing

b. DNS transfer

c. zone transfer

d. DNS poisoning

Correct

Marks for this submission: 1/1.

Question 69

Marks: 1

Instead of the Web server asking the user for the same information each time she visits that site, the

server can store that user-specific information in a file on the user’s local computer and then retrieve it

later. This file is called a(n) ____.

Choose one answer.

a. cookie

b. bug

c. ActiveX control

d. script

Correct

Marks for this submission: 1/1.

Question 70

Marks: 1

____ is a popular protocol used to manage network equipment.

Page 31: Midterm

Choose one answer.

a. SMTP

b. IMAP

c. TCP/IP

d. SNMP

Correct

Marks for this submission: 1/1.

Top of Form

Finish review

Bottom of Form

You are logged in as Josh Mena (Logout)

Theme modified by Colin Wheelhouse, based on the original theme created by Shaun Daubney

(Newbury College).