COSC 50660

subject Type Homework Help
subject Pages 18
subject Words 1870
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Generally speaking, vendors use similar mechanisms for downloading and installing
patches.
Answer:
Focusing electronic attacks on specific high-value targets is known as promiscuous
attacks.
Answer:
Social engineering is rarely used in hacking.
Answer:
A false acceptance occurs when a person is improperly matched to a template.
Answer:
page-pf2
Policies should not require that backup data be encrypted.
Answer:
Data is the principal element of any information system.
Answer:
Backup media should be encrypted.
Answer:
Using a secure cryptographic system can prevent attacks while data is being processed.
page-pf3
Answer:
In 802.11i, EAP outer authentication takes place before inner authentication.
Answer:
Security metrics allow a company to know if it is improving in its implementation of
policies.
Answer:
In relational database, a row is different from a record.
Answer:
page-pf4
To use an access point, you must know its SSID.
Answer:
With CDP, the backup site already has the proper equipment, and data and recovery is
instantaneous.
Answer:
Focusing electronic attacks on specific high-value targets is known as whaling.
Answer:
Windows offers only 3 directory permissions.
Answer:
page-pf5
Attackers frequently create exploits within hours or days after a fix is released by a
vendor.
Answer:
In fraud, the attacker deceives the victim into doing something against the victim's
financial self-interest.
Answer:
To test the digital signature, the verifier will use sender's public key.
Answer:
To get to the super user account in UNIX, the administrator can use the RunAs
command.
page-pf6
Answer:
Any device with an IP address is a host.
Answer:
When assigning initial permissions, it is good to give the least permissions believed to
be necessary and then add permissions if appropriate.
Answer:
The act of taking over a super user account is called hacking root.
Answer:
page-pf7
Changing the default listening port is an effective way of discouraging attackers from
accessing the database.
Answer:
Identity theft is stealing credit card numbers.
Answer:
Preventative countermeasures identify when a threat is attacking and especially when it
is succeeding.
Answer:
Image backup is a fast form of backups.
page-pf8
Answer:
CDP requires expensive high-speed transmission link between the sites.
Answer:
Writing data to an array of hard drives has several advantages over writing to a single
drive.
Answer:
The book recommends hard-headed thinking about security ROI analysis.
Answer:
page-pf9
Federal jurisdiction typically does not extend to computer crimes that are committed
entirely within a state and that do not have a bearing on interstate commerce.
Answer:
An example of "pressure" from the fraud triangle would include paying back embezzled
money.
Answer:
With centralized backup, each location backs up the other in real time.
Answer:
________ tell the attacker that a certain IP address has a live host or router.
A) ICMP Echo replies
B) ICMP error messages
C) Both A and B
page-pfa
D) Neither A nor B
Answer:
An IDS is a ________ control.
A) preventative
B) detective
C) restorative
D) All of the above
Answer:
The fastest propagation occurs with some types of ________.
A) viruses
B) worms
C) Trojan horses
D) bots
page-pfb
Answer:
In ________ filtering, the firewall filters packets when they are leaving the network.
A) ingress
B) egress
C) Both A and B
D) Neither A nor B
Answer:
To ensure that a digital certificate is valid, the receiver of the certificate must check
________.
A) the digital signature
B) the valid period
C) whether the certificate has been revoked
D) All of the above.
Answer:
page-pfc
A ________ is a material deficiency, or combination of significant deficiencies, that
results in more than a remote likelihood that a material misstatement in the annual or
interim financial statements will not be prevented or detected.
A) material control failure
B) material control deficiency
C) critical control deficiency
D) critical control failure
Answer:
Which of the following are reasons to ensure WWW Service and E-Commerce
security?
A) Cost of disruptions
B) Customer fraud
C) Exposure of sensitive private information
D) All of the above
Answer:
Mobile code usually is delivered through ________.
A) webpages
page-pfd
B) e-mail
C) directly propagating worms
D) All of the above
Answer:
An organization with a ________ domain name must maintain one or more DNS
servers.
A) first-level
B) second-level
C) third-level
D) All of the above.
Answer:
DoS attacks can cause harm by ________.
A) stopping a critical service
B) slowly degrading services over a period of time
C) Both A and B
D) Neither A nor B
page-pfe
Answer:
A ________ card is an access card that has a built-in microprocessor and memory.
A) magnetic stripe
B) smart
C) Both A and B
D) Neither A nor B
Answer:
If an attacker takes over a firewall, he or she will be able to ________.
A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above
Answer:
page-pff
When a system runs out of storage space, ________.
A) new events are not saved
B) the IDS will start a new log file
C) Both A and B
D) Neither A nor B
Answer:
Stealing credit card numbers is also known as ________.
A) identity theft
B) carding
C) Both A and B
D) Neither A nor B
Answer:
A ________ is an older attack that uses an illegally large IP packet to crash an operating
system.
A) smurf flood
page-pf10
B) P2P redirect
C) ping of death
D) None of the above
Answer:
Which of the following gives the best estimate of the complete cost of a compromise?
A) ALE
B) ARO
C) TCI
D) Life cycle cost
Answer:
Directory servers from different vendors are synchronized through ________.
A) LDAP
B) central authentication servers
C) AD servers
D) None of the above
page-pf11
Answer:
The organization that funded the creation of the Internet is ________.
A) the IETF
B) ISO
C) DARPA
D) the National Science Foundation
Answer:
Which CobiT domain has the most control objectives?
A) Planning & Organization
B) Acquisition & Implementation
C) Delivery & Support
D) Monitoring
Answer:
page-pf12
Under what Internet Options tabs are cookies controlled?
A) Privacy
B) Security
C) Protection
D) Advanced
Answer:
In 802.11i, ________ authentication always uses SSL/TLS.
A) inner
B) outer
C) Both A and B
D) Neither A nor B
Answer:
The ISO/IEC 2700 family focuses on ________.
A) corporate governance
B) IT governance
C) IT security governance
page-pf13
D) All of the above about equally
Answer:
Which of the following is an example of a wireless attack?
A) Unauthorized network access
B) Man-in-the-middle attack using an evil twin
C) Wireless DOS attacks
D) All of the above
Answer:
________ is a social engineering trick where an intruder may follow an authorized user
through a door that the authorized user opens with an access device.
A) Shoulder surfing
B) Shadowing
C) Trailing
D) Piggybacking
page-pf14
Answer:
When two parties in an IPsec connection communicate back and forth, there are
________ security associations.
A) 1
B) 2
C) 3
D) 4
Answer:
VoIP traffic and data traffic tend to be segregated from each other on a network for
added security.
A) True.
B) False. This would increase costs too much.
C) False. This would negate the benefits of convergence.
Answer:
page-pf15
Image backup is attractive because ________.
A) it requires minimal additional work to restore a fully functioning PC
B) it is faster than file/directory backup
C) it takes up less storage space than file/directory backup
D) Both A and C
Answer:
Which of the following is a type of VPN?
A) Host-to-host
B) Remote access
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is a formal process?
A) Annual corporate planning
B) Planning and developing individual countermeasures
C) Both A and B
page-pf16
D) Neither A nor B
Answer:
When a new EAP authentication is added, software does not have to be changed on the
________.
A) client
B) authenticator
C) central authentication server
D) No software has to be changed on ANY device
Answer:
If a firewall cannot keep up with traffic volume, it will ________.
A) continue passing all packets but slow operation
B) drop packets it cannot process
C) pass any packets it cannot filter
D) shut down, failing safely
page-pf17
Answer:
Why did hackers attack Sony Corp?
A) To test their technical skills
B) Because Sony was suing a fellow hacker
C) As part of a larger cyberwar exercise
D) Because Sony put a malicious rootkit on certain music disks
Answer:
In a crisis, human cognition ________.
A) is degraded
B) is enhanced
C) Both A and B
D) Neither A nor B
Answer:
page-pf18
Mobile computers should be backed up ________.
A) before being taken off site
B) as soon as brought back on-site
C) Neither A nor B. Mobile computers do not need to be backed up.
D) Both A and B
Answer:
________ specify how a company will restore IT functions after a disaster.
A) Business continuity plans
B) IT disaster recovery plans
C) Both A and B
D) Neither A nor B
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.