Mary is teaching an introductory cybersecurity course to freshmen. She is explaining to them
the major threats. Which of the following is not one of the three major classes of threats?
the major threats. Which of the following is not one of the three major classes of threats?
Anonymous Quiz
16%
Attempts to intrude on the system
15%
Denial of service attacks
14%
A computer virus
54%
Online auction fraud
Being able to define attack terms is an important skill for a cybersecurity professional. What is
a computer virus?
a computer virus?
Anonymous Quiz
13%
Any program that is downloaded to your system without your permission
63%
Any program that self-replicates
23%
. Any program that causes harm to your system
1%
Any program that can change your Windows Registry
Being able to define attack terms is an important skill for a cybersecurity professional. What is
spyware?
spyware?
Anonymous Quiz
65%
Any software that monitors your system
11%
Only software that logs keystrokes
15%
Any software used to gather intelligence
8%
. Only software that monitors what websites you visit
Elizabeth is explaining various hacking terms to a class. She is in the process of discussing
the history of phone system hacking. What is the term for hacking a phone system?
the history of phone system hacking. What is the term for hacking a phone system?
Anonymous Quiz
8%
Telco-hacking
10%
Hacking
12%
Cracking
70%
Phreaking
What is the name for the hacking technique that involves using persuasion and deception to
get a person to provide information to help compromise security?
get a person to provide information to help compromise security?
Anonymous Quiz
83%
A. Social engineering
0%
B. Conning
6%
C. Human intel
11%
D. Soft hacking
There are many threats on the Internet. Which one is currently the most common may
change over time, but certain threats have always been more common than others. Which of
the following is the most common threat on the Internet?
change over time, but certain threats have always been more common than others. Which of
the following is the most common threat on the Internet?
Anonymous Quiz
13%
A. Auction fraud
11%
B. Phreaking
69%
C. Computer viruses
7%
D. Illegal software
What are the three approaches to security?
Anonymous Quiz
61%
A. Perimeter, layered, hybrid
19%
B. High security, medium security, low security
13%
C. Internal, external, and hybrid
7%
D. Perimeter, complete, none
👍1
Defining your security strategy is an important step in securing a network. You are trying to
classify devices based on the approach they take to security. An intrusion detection system is
an example of which of the following?
classify devices based on the approach they take to security. An intrusion detection system is
an example of which of the following?
Anonymous Quiz
55%
A. Proactive security
22%
B. Perimeter security
14%
C. Hybrid security
9%
D. Good security practices
Which of the following is the most basic security activity?
Anonymous Quiz
62%
A. Authentication
25%
B. Firewalls
8%
C. Password protection
4%
D. Auditing
The most desirable approach to security is one that is which of the following?
Anonymous Quiz
28%
A. Perimeter and dynamic
52%
B. Layered and dynamic
9%
C. Perimeter and static
10%
D. Layered and static
According to a survey of 223 computer professionals prepared by the Computer Security
Institute, which of the following was most often cited as an issue by respondents?
Institute, which of the following was most often cited as an issue by respondents?
Anonymous Quiz
15%
A. Internal systems
67%
B. Employee abuse
12%
C. Routers
6%
D. Internet connection
Which of the following types of privacy law affects computer security?
Anonymous Quiz
6%
A. Any state privacy law
74%
B. Any privacy law applicable to your organization
12%
C. Any privacy law
8%
D. Any federal privacy law
The first computer incident-response team is affiliated with what university?
Anonymous Quiz
15%
A. Massachusetts Institute of Technology
58%
B. Carnegie-Mellon University
15%
C. Harvard University
12%
D. California Technical University
Which of the following is the best definition of the term sensitive information?
Anonymous Quiz
16%
A. Any information that has an impact on national security
14%
B. Any information that is worth more than $1,000
63%
Any information that if accessed by unauthorized personnel could damage yourorganization in any way
8%
D. Any information that is protected by privacy laws
Which of the following is a major resource for detailed information on a computer virus?
Anonymous Quiz
15%
A. The MIT Virus Library
20%
B. The Microsoft Virus Library
52%
C. The F-Secure Virus Library
12%
D. The National Virus Repository
الى هنا نكون قد انتهينا من اسئلة الشبتر الاول
بالتوفيق لكم جميعا🌹
بالتوفيق لكم جميعا🌹
👍5
Candice is discussing Internet fraud with a colleague. She is
trying to explain the most common types of fraud. What is the
term for the most common type of Internet investment fraud?
trying to explain the most common types of fraud. What is the
term for the most common type of Internet investment fraud?
Anonymous Quiz
54%
A. The Nigerian fraud
8%
B. The Manhattan fraud
30%
C. The pump and dump
8%
D. The bait and switch
You have become quite active in online investing. You want to
get some advice but are concerned about the veracity of the
advice you receive. What is the most likely problem with unsolicited investment advice?
get some advice but are concerned about the veracity of the
advice you receive. What is the most likely problem with unsolicited investment advice?
Anonymous Quiz
11%
A. You might not earn as much as claimed.
47%
B. The advice might not be truly unbiased.
26%
C. The advice might not be from a legitimate firm.
16%
D. You might lose money.