Information Technology > QUESTIONS & ANSWERS > SEC 280 Solved Quizes: Principles of Information Systems Security (All)
SEC 280 Solved Quizes: Principles of Information Systems Security Week 1 : Introduction to Security - Quiz Page 1 Question 1. 1. (TCO 1) Why is the Morris Worm significant? (Points : 3) . This ... was the first large-scale attack on the Internet. (Page 2) Question 2. 2. (TCO 1) The term script kiddies refers to _____. (Points : 3) a hacker with low-end technical ability (page 8) Question 3. 3. (TCO 1) What is a port scan? (Points : 3) . It identifies ports that are open and services that are running. (page 12) Question 4. 4. (TCO 1) Who is Kevin Mitnick? (Points : 3) He used social engineering, sniffers, and cloned cell phones to gain unauthorized access to networks belonging to Motorola, Novell, Fujitsu, and Sun Microsystems. (page 3) . Question 5. 5. (TCO 1) When a system is infected with a time bomb, it means that _____. (Points : 3) it has a piece of malicious code that will be triggered at a certain time (page 664) Question 6. 6. (TCO 1) A successful attack on a network may adversely impact security in all the following ways except _____. (Points : 3) loss of functionality (page 15) Question 7. 7. (TCO 1) According to the Computer Crime and Security Survey, the four types of attacks that increased from 2007 to 2008 were _____. (Points : 3) unauthorized access, theft and the loss of proprietary information, the misuse of Web applications, and DNS attacks (page 11) Question 8. 8. (TCO 1) When users are unable to access information or the systems processing information, they may have suffered a _____. (Points : 3) loss of availability (page 15) Question 9. 9. (TCO 1) Which of the following is a security model that addresses integrity? (Points : 3) Biba (page 45) Question 10. 10. (TCO 1) Ensuring that an individual is who he or she claims to be is the function of _____. (Points : 3) authentication (page 31) Week 2 : Network Media, Topologies and Hardware - Quiz Question 1. 1. (TCO 3) The distance between corresponding points on a wave's cycle is called its _____. (Points : 3) wavelength (page 79) Question 2. 2. (TCO 3) The hardware that makes up the enterprise-wide cabling system is known as the _____. (Points : 3) cable plant (page 116) Question 3. 3. (TCO 3) _____ is a technology used with fiber-optic cable, which enables one fiber-optic connection to carry multiple light signals simultaneously. (Points : 3) Wavelength division multiplexing (WDM) (page 86) Question 4. 4. (TCO 3) _____ signals are composed of pulses of precise, positive voltages and zero voltages. (Points : 3) Digital (page 80) Question 5. 5. (TCO 3) A hardware component that can be changed without disrupting operations is called _____. (Points : 3) hot swappable (page 253) Question 6. 6. (TCO 4) _____ are devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame's MAC address. (Points : 3) Bridges (pages 255) Question 7. 7. (TCO 4) To determine the best path, routers communicate with each other through _____. (Points : 3) routing protocols (page 271) Question 8. 8. (TCO 4) _____ are combinations of networking hardware and software that connect two dissimilar kinds of networks. (Points : 3) Gateways (page 275) Question 9. 9. (TCO 4) The loss of a signal's strength as it travels away from its source is known as _____. (Points : 3) attenuation (page 92) Question 10. 10. (TCO 4) _____ is a measure of the highest frequency of signal a multimode fiber can support over a specific distance, and is measured in MHz-km. (Points : 3) Modal bandwidth (page 260) Week 2 : Security Policies & Legal Issues - Quiz Question 1. 1. (TCO 2) Social engineers attempt to exploit the natural tendencies of people. They do this by _____. (Points : 3) first trying to evoke sympathy; if this fails, then they do so by fear of confrontation (page 67 & 68) Question 2. 2. (TCO 2) A person parks his car by an ATM, sets up a small camera discreetly pointed at the ATM keypad, and then pretends to go through bank papers in his car. This is an example of _____. (Points : 3) shoulder surfing (page 70) Question 3. 3. (TCO 2) What is a certificate? (Points : 3) A digital document used to verify the owner's identity (page 32) Question 4. 4. (TCO 2) What are the SSL and TLS used for? (Points : 3) To secure communication over the Internet (page 161) Question 5. 5. (TCO 8) Electronic signatures in the Global and National Commerce Act _____. (Points : 3) implement the principle that a signature, contract, or other record may not be denied legal effect, validity, or enforceability solely because it is in electronic form (page 608) Question 6. 6. (TCO 8) The Electronic Communications Privacy Act (ECPA) of 1986 _____. (Points : 3) addresses a myriad of legal privacy issues that resulted from the increasing use of computers and other technology specific to telecommunications (page 602) Question 7. 7. (TCO 8) What do you call a law that is based on previous events or precedents? (Points : 3) Administrative law (page 600) Common law (page 600) Question 8. 8. (TCO 8) A video rental store shares its customer database with a private investigator. The rental store may have violated which law? (Points : 3) [Show More]
Last updated: 2 years ago
Preview 1 out of 20 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 04, 2021
Number of pages
20
Written in
This document has been written for:
Uploaded
Sep 04, 2021
Downloads
0
Views
83
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·