Question:
Can some one help me on this test?
coolguyman20002000
2009-05-22 08:34:52 UTC
Complete the following questions.
1. A __________ is anything that has not been protected against threats.
A. vulnerability
B. phish
C. countermeasure
D. spoof

2. Which type of the threat is impossible to prevent and usually difficult to predict?
A. Internet threats
B. power-related threats
C. social engineering
D. natural disasters

3. Which of the following is NOT a common power-related threat to computer equipment?
A. line noise
B. power failure
C. voltage spikes
D. electrical storms

4. Which of the following is NOT a common method of hacking?
A. sniffing
B. IP spoofing
C. password cons
D. phishing

5. Which of the following is NOT a likely target for a cyberterrorism attack?
A. government agencies
B. public libraries
C. power plants
D. water treatment plants

6. Which device is NOT a countermeasure to power-related threats?
A. surge suppressor
B. line conditioner
C. voltage generator
D. uninterruptible power supply (UPS)

7. Countermeasures are classified into two groups. The first group protects the information of an individual or group. The second group of countermeasures protects
A. the computer system against unauthorized access.
B. the computer system against physical harm.
C. the computer system from natural disasters.
D. the computer system from all degrees of harm.

8. Which of the following is a countermeasure that would best address line noise from high demand electrical equipment operating near a computer?
A. uninterruptible power supply (UPS)
B. surge suppressor
C. line conditioner
D. firewall

9. Creating a _____________ can help protect valuable equipment and data in the case of a fire, earthquake, or hurricane.
A. recovery diagram
B. disaster plan
C. emergency backup plan
D. data redundancy schedule

10. Which of the following is the most simple and effective method for protecting a computer from being used for unauthorized access to a network?
A. Installation of a firewall on all computers connected to the Internet
B. Proper configuration of a Web site filter
C. Configuring the screen saver so it automatically locks access to the computer after a given amount of time
D. Installation of a pop-up blocker and cookie management software program

11. What is the key step in protecting data from a total system failure?
A. Creating a threat assessment report
B. Developing a natural disaster plan
C. Running a regular data backup routine
D. Installing a firewall on all computers connected to the Internet

12. Which of the following is a program that tracks a user’s activity and reports to someone else?
A. web bug
B. pop-up blocker
C. anti-virus application
D. spam message

13. Phishing is a type of threat in which
A. a hacker forges or changes data in a financial data system.
B. a hacker contacts you by phone or e-mail and attempts to acquire your password.
C. a hacker gains entry to a network by pretending to be at a legitimate computer.
D. a hacker creates a virus that works by locating security holes in a computer network.

14. The term __________ describes a method in which malicious code is installed on a computer when it is disguised as a useful and trusted program.
A. attack script
B. worm
C. Trojan horse
D. spam

15. ___________ describes the process in which a hacker uses a malicious code to order large numbers of computers to send multiple requests to a single Web server in an effort to overload the target Web server.
A. Denial of service
B. Sniffing
C. Terrorism
D. Data diddling

16. IP spoofing is a type of threat in which
A. a hacker forges or changes data in a financial data system.
B. a hacker contacts you by phone or e-mail and attempts to acquire your password.
C. a hacker gains entry to a network by pretending to be at a legitimate computer.
D. hackers create a virus that works by locating security holes in a computer network.

17. Which of the following is NOT a method used for installing spyware on a computer?
A. shareware programs sometimes carry spyware
B. advertisements in pop-up windows can carry spyware
C. freeware programs sometimes carry spyware
D. Internet search sites sometimes install spyware

18. __________cookies come from a Web site other than the one you are viewing.
A. Third-party
B. First-party
C. Session
D. Persistent

19. A worm is a type of threat in which
A. a hacker forges or changes data in a financial data system.
B. a hacker contacts you by phone or e-mail and attempts to acquire your password.
C. a hacker gains entry to a network by pretending to be at a legitimate computer.
D. a hacker create a virus that works by locating security holes in a computer network.

20. Which is NOT a type of threat to computer sec
Six answers:
degub0y
2009-05-22 08:48:33 UTC
1.A

2.C

3.A

4.C

5.B

6.B

7. no idea

8. no idea

9. C

10. A

11. C

12. A

13. B

14. C

15. A

16.C

17. all of these are true... i guess D is the best

18. A.

19. D



lol i was bored
Mister Answerman
2009-05-22 15:50:50 UTC
Choose "A". 7 times out of 10 the answer is "A"

This way you get a 70% pass rate.
2009-05-22 16:09:37 UTC
Try googling and do it your self. If you know anyone who is doing/has done it ask them if you can copy.
Iknowalittle
2009-05-22 15:43:04 UTC
With Homework maybe, Do your test for you, sorry, won't do that.
phillip.stockman
2009-05-22 15:39:32 UTC
you need to do the test by your self
Bobby
2009-05-22 15:46:13 UTC
2,D

3,D

4,D

i guess i know only thse..


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...