What is the name for the hacking technique that involves using persuasion and deception to
get a person to provide information to help compromise security?
get a person to provide information to help compromise security?
Anonymous Quiz
83%
A. Social engineering
0%
B. Conning
6%
C. Human intel
11%
D. Soft hacking
There are many threats on the Internet. Which one is currently the most common may
change over time, but certain threats have always been more common than others. Which of
the following is the most common threat on the Internet?
change over time, but certain threats have always been more common than others. Which of
the following is the most common threat on the Internet?
Anonymous Quiz
13%
A. Auction fraud
11%
B. Phreaking
69%
C. Computer viruses
7%
D. Illegal software
What are the three approaches to security?
Anonymous Quiz
61%
A. Perimeter, layered, hybrid
19%
B. High security, medium security, low security
13%
C. Internal, external, and hybrid
7%
D. Perimeter, complete, none
👍1
Defining your security strategy is an important step in securing a network. You are trying to
classify devices based on the approach they take to security. An intrusion detection system is
an example of which of the following?
classify devices based on the approach they take to security. An intrusion detection system is
an example of which of the following?
Anonymous Quiz
55%
A. Proactive security
22%
B. Perimeter security
14%
C. Hybrid security
9%
D. Good security practices
Which of the following is the most basic security activity?
Anonymous Quiz
62%
A. Authentication
25%
B. Firewalls
8%
C. Password protection
4%
D. Auditing
The most desirable approach to security is one that is which of the following?
Anonymous Quiz
28%
A. Perimeter and dynamic
52%
B. Layered and dynamic
9%
C. Perimeter and static
10%
D. Layered and static
According to a survey of 223 computer professionals prepared by the Computer Security
Institute, which of the following was most often cited as an issue by respondents?
Institute, which of the following was most often cited as an issue by respondents?
Anonymous Quiz
15%
A. Internal systems
67%
B. Employee abuse
12%
C. Routers
6%
D. Internet connection
Which of the following types of privacy law affects computer security?
Anonymous Quiz
6%
A. Any state privacy law
74%
B. Any privacy law applicable to your organization
12%
C. Any privacy law
8%
D. Any federal privacy law
The first computer incident-response team is affiliated with what university?
Anonymous Quiz
15%
A. Massachusetts Institute of Technology
58%
B. Carnegie-Mellon University
15%
C. Harvard University
12%
D. California Technical University
Which of the following is the best definition of the term sensitive information?
Anonymous Quiz
16%
A. Any information that has an impact on national security
14%
B. Any information that is worth more than $1,000
63%
Any information that if accessed by unauthorized personnel could damage yourorganization in any way
8%
D. Any information that is protected by privacy laws
Which of the following is a major resource for detailed information on a computer virus?
Anonymous Quiz
15%
A. The MIT Virus Library
20%
B. The Microsoft Virus Library
52%
C. The F-Secure Virus Library
12%
D. The National Virus Repository
الى هنا نكون قد انتهينا من اسئلة الشبتر الاول
بالتوفيق لكم جميعا🌹
بالتوفيق لكم جميعا🌹
👍5
Candice is discussing Internet fraud with a colleague. She is
trying to explain the most common types of fraud. What is the
term for the most common type of Internet investment fraud?
trying to explain the most common types of fraud. What is the
term for the most common type of Internet investment fraud?
Anonymous Quiz
54%
A. The Nigerian fraud
8%
B. The Manhattan fraud
30%
C. The pump and dump
8%
D. The bait and switch
You have become quite active in online investing. You want to
get some advice but are concerned about the veracity of the
advice you receive. What is the most likely problem with unsolicited investment advice?
get some advice but are concerned about the veracity of the
advice you receive. What is the most likely problem with unsolicited investment advice?
Anonymous Quiz
11%
A. You might not earn as much as claimed.
47%
B. The advice might not be truly unbiased.
26%
C. The advice might not be from a legitimate firm.
16%
D. You might lose money.
Juan is a security officer for an investment firm. He is
explaining various scams to the brokers. What is the term for
artificially inflating a stock in order to sell it at a higher value?
explaining various scams to the brokers. What is the term for
artificially inflating a stock in order to sell it at a higher value?
Anonymous Quiz
10%
A. Bait and switch
14%
B. The Nigerian fraud
64%
C. Pump and dump
12%
D. The Wall Street fraud
What is the top rule for avoiding Internet fraud?
Anonymous Quiz
50%
A. If it seems too good to be true, it probably is.
19%
B. Never use your bank account numbers.
21%
C. Only work with people who have verifiable emailaddresses.
10%
D. Don’t invest in foreign deals.
Which of the following is not one of the Security and Exchange
Commission’s tips for avoiding investment fraud?
Commission’s tips for avoiding investment fraud?
Anonymous Quiz
64%
A. Don’t invest online.
19%
B. Consider the source of the offer.
7%
C. Always be skeptical.
10%
D. Always research the investment.
Aliya is active on online auctions but wants to avoid auction
fraud. What are the four categories of auction fraud?
fraud. What are the four categories of auction fraud?
Anonymous Quiz
19%
A. Failure to send, failure to disclose, sending to wrongaddress, failure to deliver
64%
B. Failure to send, failure to disclose, sending something oflesser value, failure to deliver
17%
C. Failure to disclose, sending something to wrong address,failure to send, failure to deliver
What is the term for a seller bidding on her own item to drive
up the price?
up the price?
Anonymous Quiz
18%
A. Bid siphoning
27%
B. Bid shielding
51%
C. Shill bidding
4%
D. Ghost bidding
What is the term for submitting a fake but very high bid to deter
other bidders?
other bidders?
Anonymous Quiz
10%
A. Bid siphoning
69%
B. Bid shielding
10%
C. Shill bidding
10%
D. Ghost bidding