Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Media Study » Page 14

Media Study

Q: Attackers rarely use IP address spoofing to conceal their identities.

Q: Traditional hackers are motivated by ________. A) thrill B) validation of power C) doing damage as a by-product D) All of the above

Q: Most traditional external hackers do not cause extensive damage or commit theft for money.

Q: Most traditional external hackers cause extensive damage or commit theft for money.

Q: Most traditional external attackers were heavily motivated by ________. A) the thrill of breaking in B) making money through crime C) Both A and B D) Neither A nor B

Q: You receive an e-mail that seems to come from a frequent customer. It contains specific information about your relationship with the customer. Clicking on a link in the message takes you to a website that seems to be your customer's website. However, the website is fake. This is ________. (Pick the most precise answer.) A) social engineering B) a hoax C) phishing D) spear fishing

Q: You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to be your bank's website. However, the website is fake. This is called a ________ attack. (Pick the most precise answer.) A) social engineering B) a hoax C) phishing D) spear fishing

Q: The definition of spam is "unsolicited commercial e-mail."

Q: ________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer.) A) Social engineering B) Spam C) E-mail attachment D) Mobile code

Q: Mobile code usually is contained in webpages.

Q: Mobile code usually is delivered through ________. A) webpages B) e-mail C) directly propagating worms D) All of the above

Q: Which type of program can hide itself from normal inspection and detection? A) Trojan horse B) Stealth Trojan C) Spyware D) Rootkit

Q: Rootkits replace legitimate programs and are considered a deeper threat than a set of programs called Trojan horses.

Q: Most cookies are dangerous.

Q: Which of the following can be a type of spyware? A) A cookie B) A keystroke logger C) Both A and B D) Neither A nor B

Q: A ________ is a small program that, after installed, downloads a larger attack program. A) Trojan horse B) Trojan pony C) Stub D) Downloader

Q: A program that gives the attacker remote access control of your computer is specifically called a ________. A) Trojan horse B) spyware program C) cookie D) RAT

Q: A Trojan horse is a program that hides itself by deleting a system file and taking on the system file's name.

Q: Nonmobile malware can be on webpages that users download.

Q: In a virus, the code that does damage is called the ________. A) exploit B) compromise C) payload D) vector

Q: The fastest propagation occurs with some types of ________. A) viruses B) worms C) Trojan horses D) bots

Q: Some ________ can jump directly between computers without human intervention. A) viruses B) worms C) Both A and B D) Neither A nor B

Q: ________ can spread through e-mail attachments. A) Viruses B) Worms C) Both A and B D) Neither A nor B

Q: ________ are programs that attach themselves to legitimate programs. A) Viruses B) Worms C) Both A and B D) Neither A nor B

Q: ________ is a generic term for "evil software." A) Virus B) Worm C) Malware D) Threat

Q: ________ consists of activities that violate a company's IT use policies or ethics policies. A) Fraud B) Extortion C) Hacking D) Abuse

Q: In fraud, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.

Q: In hacking, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.

Q: In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. A) fraud B) extortion C) hacking D) abuse

Q: The terms "intellectual property" and "trade secret" are synonymous.

Q: Penalties for hacking are ________. A) limited only if a hacker stole $1000 B) limited only if a hacker stole over $1,000,000 C) irrelevant of the amount stolen D) none of the above

Q: The definition of hacking is "intentionally accessing a computer resource without authorization or in excess of authorization."

Q: When considering penalties for hacking, motivation is irrelevant.

Q: The definition of hacking is "accessing a computer resource without authorization or in excess of authorization."

Q: You have access to your home page on a server. By accident, you discover that if you hit a certain key, you can get into someone else's files. You spend just a few minutes looking around. This is hacking.

Q: Someone sends you a "game." When you run it, it logs you into an IRS server. This is hacking.

Q: You accidentally find someone's password and use it to get into a system. This is hacking.

Q: Downloading pornography can lead to sexual harassment lawsuits.

Q: Misappropriation of assets is an example of employee financial theft.

Q: ________ is the destruction of hardware, software, or data. A) Sabotage B) Hacking C) Extortion D) Denial of Service

Q: What type of employee is the most dangerous when it comes to internal IT attacks? A) Data entry clerks B) Financial professionals C) IT professionals D) IT security professionals

Q: Employees are very dangerous because they ________. A) often have access to sensitive parts of the system B) are trusted by companies C) Both A and B D) Neither A nor B

Q: Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.

Q: Employees pose an increased risk to organizations as they ofter have access to sensitive parts of systems.

Q: What were the approximate dollar losses for the series of data breaches against Sony Corp? A) $54 million B) $171 million C) $254 million D) $1.6 billion

Q: Why did hackers attack Sony Corp? A) To test their technical skills B) Because Sony was suing a fellow hacker C) As part of a larger cyberwar exercise D) Because Sony put a malicious rootkit on certain music disks

Q:

Q: About how long was the Sony PlayStation Network offline as a result of the cyber attacks? A) 3 days B) 3 weeks C) 3 months D) It never went down.

Q: The attack method used in the Sony data breaches was ________. A) Cross-site scripting B) SQL injection C) Denial of service D) None of the above

Q: Most countermeasure controls are detective controls.

Q: Most countermeasure controls are preventative controls.

Q: Preventative countermeasures keep attacks from succeeding.

Q: Detective countermeasures keep attacks from succeeding.

Q: Detective countermeasures identify when a threat is attacking and especially when it is succeeding.

Q: Preventative countermeasures identify when a threat is attacking and especially when it is succeeding.

Q: Which of the following is a type of countermeasure? A) Detective B) Corrective C) Both A and B D) Neither A nor B

Q: Another name for safeguard is ________. A) countermeasure B) compromise C) Both A and B D) Neither A nor B

Q: When a threat succeeds in causing harm to a business, this is a(n) ________. A) breach B) countermeasure C) Both A and B D) Neither A nor B

Q: When a threat succeeds in causing harm to a business, this is called a ________. A) breach B) compromise C) incident D) All of the above

Q: Which of the following are types of countermeasures? A) Preventative B) Detective C) Corrective D) All of the above

Q: If an attacker breaks into a corporate database and deletes critical files, this is a attack against the ________ security goal. A) integrity B) confidentiality C) Both A and B D) Neither A nor B

Q: The three common core goals of security are ________. A) confidentiality, integrity, and availability B) confidentiality, information, and availability C) confidentiality, integrity, and authentication D) confidentiality, information, and authorization

Q: Confidentiality means that attackers cannot change or destroy information.

Q: Threat environment consists of the types of attackers and attacks that companies face.

Q: In e-mail, the security standards situation is mature.

Q: Which of the following sends passwords in the clear? A) FTP B) SSH C) Both A and B D) Neither A nor B

Q: In e-mail, the ________ protocol is fused or downloading new mail from the recipient's mail server to the recipient's PC. A) SMTP B) POP C) Both A and B D) Neither A nor B

Q: There usually are two protocols for each application.

Q: The SNMP ________ command is very dangerous. A) SET B) GET C) Both A and B D) Neither A nor B

Q: To get configuration information from managed devices on the network and to change the configuration of managed devices, companies use ________. A) DNS B) DHCP C) SNMP D) ICMP

Q: ________ is not limited to TCP/IP routing. A) OSPF B) RIP C) BGP D) EIGRP

Q: The main exterior dynamic routing protocol is ________. A) OSPF B) RIP C) BGP D) EIGRP

Q: The main TCP/IP interior dynamic routing protocol for large networks is ________. A) OSPF B) RIP C) BGP D) EIGRP

Q: A ________ server gives an original host the IP address of another host to which the original host wishes to send packets. A) DHCP B) DNS C) Both A and B D) Neither A nor B

Q: A ________ is likely to have the same address each time it goes on the Internet. A) client B) server C) Both A and B D) Neither A nor B

Q: Client usually get ________. A) static IP addresses B) ephemeral IP addresses C) dynamic IP addresses D) None of the above.

Q: Servers get ________. A) static IP addresses B) ephemeral IP addresses C) dynamic IP addresses D) None of the above.

Q: DNSSEC ________. A) is still under development B) is widely used C) is no longer used D) There is no such thing as DNSSEC.

Q: In DNS cache poisoning, an attacker replaces the IP address of a host name with another IP address.

Q: An organization with a ________ domain name must maintain one or more DNS servers. A) first-level B) second-level C) third-level D) All of the above.

1 2 3 … 27 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved