Filters
Question type

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

Correct Answer

verifed

verified

_____ refers to confidence scams executed through technology.

Correct Answer

verifed

verified

Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.

Correct Answer

verifed

verified

VPN or vir...

View Answer

Which of the following statements holds true for the term encryption?


A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

Correct Answer

verifed

verified

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.

Correct Answer

verifed

verified

Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

Correct Answer

verifed

verified

Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?


A) Lack of technology to identify the origin of a security attack
B) Non-recognition of commission of a security-related crime
C) Unwillingness of developed countries to share technical know-how with lesser-developed countries
D) Non-existent extradition agreements between two countries
E) Technological incompatibility between the two countries

Correct Answer

verifed

verified

_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.

Correct Answer

verifed

verified

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.


A) DDos
B) Rootkit
C) Keylogging
D) CAPTCHa
E) VPN

Correct Answer

verifed

verified

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?


A) Audit trails
B) Intrusion detection tools
C) Access control tools
D) User-tracking tools
E) Network watching tools

Correct Answer

verifed

verified

Which weakness of Web sites to launch attacks does an SQL injection technique exploit?


A) Sloppy programming practices where software developers do not validate user input
B) Lack of in-built anti-virus features
C) Irregular auditing of Web site content
D) Ease of infiltrating the Web site
E) Non-employment of encryption techniques

Correct Answer

verifed

verified

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?


A) Phishing
B) Social engineering
C) Password theft
D) Virus infections
E) Physical threats

Correct Answer

verifed

verified

_____ refers to a trusted third party that provides authentication services in public key encryption schemes.

Correct Answer

verifed

verified

Certificat...

View Answer

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.

Correct Answer

verifed

verified

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

Correct Answer

verifed

verified

distribute...

View Answer

URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.

Correct Answer

verifed

verified

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

Correct Answer

verifed

verified

Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.

Correct Answer

verifed

verified

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?


A) Cyber-fraud
B) Corporate espionage
C) Carrying out technology disruptions
D) Extortion
E) Illegal funds transfer

Correct Answer

verifed

verified

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.


A) overlamination processes
B) biometrics
C) smart tags
D) bio-embedded systems
E) holographs

Correct Answer

verifed

verified

Showing 21 - 40 of 87

Related Exams

Show Answer