Midterm
-
Upload
liliam-luque -
Category
Documents
-
view
345 -
download
6
Transcript of Midterm
Josh Mena
Update profile
My courses
Logout
Tuesday 21 June 2011
You are here
Barry University
/ ► IT320WD1102
/ ► Quizzes
/ ► Midterm Exam
/ ► Review of attempt 1
Midterm Exam
Review of attempt 1
Top of Form
Finish review
Bottom of Form
Started on Tuesday, 21 June 2011, 05:24 PM
Completed on Tuesday, 21 June 2011, 05:52 PM
Time taken 28 mins 12 secs
Marks 67/70
Grade 33.5 out of a maximum of 35 (96%)
Question 1
Marks: 1
____ involves using someone’s personal information, such as social security numbers, to establish bank
or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their
credit rating.
Choose one answer.
a. Cyberterrorism
b. Identity theft
c. Phishing
d. Scam
Correct
Marks for this submission: 1/1.
Question 2
Marks: 1
In a general sense, security is defined as a state of freedom from danger or risk.
Answer:
True False
Incorrect
Marks for this submission: 0/1.
Question 3
Marks: 1
SMTP servers can forward e-mail sent from an e-mail client to a remote domain. This is known as ____.
Choose one answer.
a. SMTP relay
b. IMAP
c. Spam
d. Spam relay
Correct
Marks for this submission: 1/1.
Question 4
Marks: 1
Flash memory is a type of ____, nonvolatile computer memory that can be electrically erased and
rewritten repeatedly.
Choose one answer.
a. EROM
b. ROM
c. EEPROM
d. RAM
Correct
Marks for this submission: 1/1.
Question 5
Marks: 1
A ____ is a program advertised as performing one activity but actually does something else.
Choose one answer.
a. script
b. virus
c. Trojan
d. worm
Correct
Marks for this submission: 1/1.
Question 6
Marks: 1
What is another name for unsolicited e-mail messages?
Choose one answer.
a. spam
b. spawn
c. trash
d. scam
Correct
Marks for this submission: 1/1.
Question 7
Marks: 1
The “return address” of a program is the only element that can be altered through a buffer overflow
attack.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 8
Marks: 1
The loss of employee productivity is the single largest cause of financial loss due to a security breach.
Answer:
True False
Incorrect
Marks for this submission: 0/1.
Question 9
Marks: 1
Regarding e-mail, ____ handles outgoing mail.
Choose one answer.
a. SMTP
b. POP3
c. IMAP
d. SNMP
Correct
Marks for this submission: 1/1.
Question 10
Marks: 1
In a company of 500 employees, it is estimated that _____ employees would be required to combat a
virus attack.
Choose one answer.
a. two
b. five
c. seven
d. ten
Correct
Marks for this submission: 1/1.
Question 11
Marks: 1
In a “____ attack,” a TCP/IP ping request is sent to all computers on the network, which makes it appear
that a server is asking for a response.
Choose one answer.
a. smurf
b. ping of death
c. frame
d. DNS poisoning
Correct
Marks for this submission: 1/1.
Question 12
Marks: 1
____ is a process of ensuring that any inputs are “clean” and will not corrupt the system.
Choose one answer.
a. Cross-site scripting
b. SQL injection
c. Script injection
d. Input validation
Correct
Marks for this submission: 1/1.
Question 13
Marks: 1
At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the
necessary information for devices that want to join the network. This process is known as ____.
Choose one answer.
a. beaconing
b. scanning
c. mapping
d. caching
Correct
Marks for this submission: 1/1.
Question 14
Marks: 1
Network devices are commonly protected by passwords to prevent unauthorized users from accessing
the device and changing configuration settings.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 15
Marks: 1
____ is a software program that delivers advertising content in a manner that is unexpected and
unwanted by the user.
Choose one answer.
a. Adware
b. Keylogger
c. Spam
d. Trojan
Correct
Marks for this submission: 1/1.
Question 16
Marks: 1
Utility companies, telecommunications, and financial services are considered prime targets of
cyberterrorists because they can significantly disrupt business and personal activities by destroying a
few targets.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 17
Marks: 1
The _____ act is designed to broaden the surveillance of law enforcement agencies so they can detect
and suppress terrorism.
Choose one answer.
a. Gramm-Leach-Bliley
b. Sarbanes-Oxley
c. California Database Security Breach
d. USA Patriot
Correct
Marks for this submission: 1/1.
Question 18
Marks: 1
The ____ are the operating system settings that impose how the policy will be enforced.
Choose one answer.
a. security policies
b. group policies
c. security templates
d. configuration baselines
Correct
Marks for this submission: 1/1.
Question 19
Marks: 1
_____ ensures that only authorized parties can view information.
Choose one answer.
a. Security
b. Availability
c. Integrity
d. Confidentiality
Correct
Marks for this submission: 1/1.
Question 20
Marks: 1
A ____ is a single, dedicated hard disk-based file storage device that provides centralized and
consolidated disk storage available to LAN users through a standard network connection.
Choose one answer.
a. NAS
b. NSA
c. NSF
d. NFS
Correct
Marks for this submission: 1/1.
Question 21
Marks: 1
The goal of ____ is to make it harder to predict where the operating system functionality resides in
memory.
Choose one answer.
a. DEP
b. ASLR
c. NX
d. ASNX
Correct
Marks for this submission: 1/1.
Question 22
Marks: 1
A computer ____ is a program that secretly attaches itself to a legitimate “carrier,” such as a document
or program, and then executes when that document is opened or program is launched.
Choose one answer.
a. virus
b. worm
c. adware
d. spyware
Correct
Marks for this submission: 1/1.
Question 23
Marks: 1
With operating system virtualization, a virtual machine is simulated as a self-contained software
environment by the ____ system (the native operating system to the hardware).
Choose one answer.
a. guest
b. host
c. root
d. server
Correct
Marks for this submission: 1/1.
Question 24
Marks: 1
According to the research group Postini, over ____ of daily e-mail messages are unsolicited and could be
carrying a malicious payload.
Choose one answer.
a. one-third
b. two-thirds
c. three-fourths
d. four-fifths
Correct
Marks for this submission: 1/1.
Question 25
Marks: 1
Targeted attacks against financial networks, unauthorized access to information, and the theft of
personal information is sometimes known as ____.
Choose one answer.
a. spam
b. phishing
c. cybercrime
d. cyberterrorism
Correct
Marks for this submission: 1/1.
Question 26
Marks: 1
____ hinges on an attacker being able to enter an SQL database query into a dynamic Web page.
Choose one answer.
a. XSS
b. SQL injection
c. Script injection
d. Sandboxing
Correct
Marks for this submission: 1/1.
Question 27
Marks: 1
In information security, a loss can be _____.
Choose one answer.
a. theft of information
b. a delay in transmitting information that results in a financial penalty
c. the loss of good will or a reputation
d. all of the above
Correct
Marks for this submission: 1/1.
Question 28
Marks: 1
The ____ record is an entry in the Domain Name System (DNS) that identifies the mail server responsible
for handling that domain name.
Choose one answer.
a. DEP
b. AX
c. IM
d. MX
Correct
Marks for this submission: 1/1.
Question 29
Marks: 1
____ technology enables a virtual machine to be moved to a different physical computer with no impact
to the users.
Choose one answer.
a. Live migration
b. Load balancing
c. Operating system virtualization
d. Server virtualization
Correct
Marks for this submission: 1/1.
Question 30
Marks: 1
A(n) ____ is a computer programming language that is typically interpreted into a language the
computer can understand.
Choose one answer.
a. ActiveX control
b. cookie
c. shell
d. scripting language
Correct
Marks for this submission: 1/1.
Question 31
Marks: 1
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific
logical event.
Choose one answer.
a. Trojan
b. logic bomb
c. macro virus
d. metamorphic virus
Correct
Marks for this submission: 1/1.
Question 32
Marks: 1
One of the most important steps in hardening an operating system to resist attacks is to apply updates.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 33
Marks: 1
The most common type of antenna for war driving is an omnidirectional antenna, also known as a ____
antenna.
Choose one answer.
a. bipole
b. dipole
c. GPS
d. tagging
Correct
Marks for this submission: 1/1.
Question 34
Marks: 1
DoS attacks are limited to wired networks and cannot be used against wireless networks.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 35
Marks: 1
The ____ is the link between the cellular network and the wired telephone world and controls all
transmitters and base stations in the cellular network.
Choose one answer.
a. SAN
b. NAS
c. RF cell
d. MTSO
Correct
Marks for this submission: 1/1.
Question 36
Marks: 1
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive
information.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 37
Marks: 1
COPPA requires operators of online services or Web sites designed for children under the age of _____
to obtain parental consent prior to the collection, use, disclosure, or display of a child’s personal
information.
Choose one answer.
a. 8
b. 10
c. 13
d. 16
Correct
Marks for this submission: 1/1.
Question 38
Marks: 1
Passive wireless discovery through war driving in itself is an illegal activity.
Answer:
True False
Incorrect
Marks for this submission: 0/1.
Question 39
Marks: 1
DNS poisoning can be prevented by using the latest editions of the DNS software, ____.
Choose one answer.
a. BIND
b. DNSS
c. IPsec
d. BINDSEC
Correct
Marks for this submission: 1/1.
Question 40
Marks: 1
The most common protocol suite used today for networks as well as the Internet is ____.
Choose one answer.
a. TCP/IP
b. SMTP
c. SNMP
d. DNS
Correct
Marks for this submission: 1/1.
Question 41
Marks: 1
What is the maximum fine for those who wrongfully disclose individually identifiable health information
with the intent to sell it?
Choose one answer.
a. $100,000
b. $250,000
c. $500,000
d. $1,000,000
Correct
Marks for this submission: 1/1.
Question 42
Marks: 1
Because NAS operates at the file system level, NAS security cannot be implemented through the
standard operating system security features.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 43
Marks: 1
____ involves horizontally separating words, although it is still readable by the human eye.
Choose one answer.
a. Word splitting
b. GIF layering
c. Geometric variance
d. Layer variance
Correct
Marks for this submission: 1/1.
Question 44
Marks: 1
Under the _____ , healthcare enterprises must guard protected health information and implement
policies and procedures to safeguard it, whether it be in paper or electronic format.
Choose one answer.
a. HIPAA
b. HLPDA
c. HCPA
d. USHIPA
Correct
Marks for this submission: 1/1.
Question 45
Marks: 1
Wireless location mapping is the formal expression for ____.
Choose one answer.
a. wireless scanning
b. wireless caching
c. war driving
d. wireless beaconing
Correct
Marks for this submission: 1/1.
Question 46
Marks: 1
A study by Foote Partners showed that security certifications earn employees ____ percent more pay
than their uncertified counterparts.
Choose one answer.
a. 10 to 14
b. 12 to 15
c. 13 to 14
d. 14 to 16
Correct
Marks for this submission: 1/1.
Question 47
Marks: 1
In order to avoid detection some viruses can alter how they appear. These are known as ____ viruses.
Choose one answer.
a. macro
b. metamorphic
c. boot
d. companion
Correct
Marks for this submission: 1/1.
Question 48
Marks: 1
As a reaction to a rash of corporate fraud, the Gramm-Leach-Bliley Act (GLBA) is an attempt to fight
corporate corruption.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 49
Marks: 1
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system
known as the ____.
Choose one answer.
a. ARPAnet
b. DNS
c. SNMP
d. SMTP
Correct
Marks for this submission: 1/1.
Question 50
Marks: 1
Regarding e-mail, ____ is responsible for incoming mail.
Choose one answer.
a. SMTP
b. IMAP
c. POP3
d. SNMP
Correct
Marks for this submission: 1/1.
Question 51
Marks: 1
Common network device vulnerabilities include weak passwords, default accounts, back doors, and
privilege escalation.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 52
Marks: 1
A ____ virus can interrupt almost any function executed by the computer operating system and alter it
for its own malicious purposes.
Choose one answer.
a. companion
b. file infector
c. resident
d. boot
Correct
Marks for this submission: 1/1.
Question 53
Marks: 1
According to the 2007 FBI Computer Crime and Security Survey, the loss due to the theft of confidential
data for 494 respondents was approximately ____.
Choose one answer.
a. $1 million
b. $10 million
c. $50 million
d. $100 million
Correct
Marks for this submission: 1/1.
Question 54
Marks: 1
JavaScript resides inside HTML documents.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 55
Marks: 1
I found this test to be..
Choose one answer.
a. Easy, I could take it with my eyes open.
b. Very Difficult, I was caught up in the Heat Championships and was too mesmorized to study.
c. Easy, I could take it with my eyes closed.
d. Difficult, I just starred at my textbook for the last few weeks.
e. Average, I had to open my textbook and look at it.
Correct
Marks for this submission: 1/1.
Question 56
Marks: 1
____ uses “speckling” and different colors so that no two spam e-mails appear to be the same.
Choose one answer.
a. GIF layering
b. Geometric variance
c. Word splitting
d. Layer variance
Correct
Marks for this submission: 1/1.
Question 57
Marks: 1
Each wireless device looks for beacon frames in a process known as ____.
Choose one answer.
a. mapping
b. scanning
c. caching
d. beaconing
Correct
Marks for this submission: 1/1.
Question 58
Marks: 1
A(n) ____ attack makes a copy of the transmission before sending it to the recipient.
Choose one answer.
a. man-in-the-middle
b. replay
c. DNS spoofing
d. ARP poisoning
Correct
Marks for this submission: 1/1.
Question 59
Marks: 1
____ enables the attacker’s computer to forward any network traffic it receives from Computer A to the
actual router.
Choose one answer.
a. IP mirroring
b. Port mirroring
c. IP forwarding
d. Port forwarding
Correct
Marks for this submission: 1/1.
Question 60
Marks: 1
____ is a language used to view and manipulate data that is stored in a relational database.
Choose one answer.
a. CSS
b. XSS
c. SQL
d. DEP
Correct
Marks for this submission: 1/1.
Question 61
Marks: 1
____ are active Internet connections that download a specific file that is available through a tracker.
Choose one answer.
a. Torrents
b. Applets
c. ActiveX controls
d. Scripts
Correct
Marks for this submission: 1/1.
Question 62
Marks: 1
____ is the name given to a wireless technology that uses short-range RF transmissions.
Choose one answer.
a. Bluetooth
b. Piconet
c. Scatternet
d. Wi-fi
Correct
Marks for this submission: 1/1.
Question 63
Marks: 1
In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a
single computer or network.
Choose one answer.
a. centered
b. local
c. remote
d. distributed
Correct
Marks for this submission: 1/1.
Question 64
Marks: 1
A group of piconets in which connections exist between different piconets is called a ____.
Choose one answer.
a. shortnet
b. meshnet
c. multinet
d. scatternet
Correct
Marks for this submission: 1/1.
Question 65
Marks: 1
TCP/IP hijacking is successful because several protocols, such as File Transfer Protocol (FTP) and Telnet,
do not check the source IP addresses of the device from which they receive packets.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 66
Marks: 1
Like Java applets, ActiveX controls also run in a sandbox.
Answer:
True False
Correct
Marks for this submission: 1/1.
Question 67
Marks: 1
One type of virtualization in which an entire operating system environment is simulated is known as
____ virtualization.
Choose one answer.
a. NOS
b. guest
c. operating system
d. host
Correct
Marks for this submission: 1/1.
Question 68
Marks: 1
One approach to substituting a fraudulent IP address is to target the external DNS server and is called
____.
Choose one answer.
a. DNS spoofing
b. DNS transfer
c. zone transfer
d. DNS poisoning
Correct
Marks for this submission: 1/1.
Question 69
Marks: 1
Instead of the Web server asking the user for the same information each time she visits that site, the
server can store that user-specific information in a file on the user’s local computer and then retrieve it
later. This file is called a(n) ____.
Choose one answer.
a. cookie
b. bug
c. ActiveX control
d. script
Correct
Marks for this submission: 1/1.
Question 70
Marks: 1
____ is a popular protocol used to manage network equipment.
Choose one answer.
a. SMTP
b. IMAP
c. TCP/IP
d. SNMP
Correct
Marks for this submission: 1/1.
Top of Form
Finish review
Bottom of Form
You are logged in as Josh Mena (Logout)
Theme modified by Colin Wheelhouse, based on the original theme created by Shaun Daubney
(Newbury College).