SEC280 Week 1 Quiz latest 2016 september (all correct answers)
1. Question :
(TCO 1) Which of the following is not part of the information security triad?
Confidentiality
Integrity
Availability
Ethics
Question 2. Question :
(TCO 1) Symmetrical encryption uses
one key to encrypt and another key to decrypt.
the same key to encrypt and decrypt.
a certificate authority to manage the keys.
large prime numbers.
Question 3. Question :
(TCO 1) What is the most common name for the first large-scale attack on the Internet, which occurred in November of 1988?
The Code Red Worm
The Morris Worm
The Slammer Worm
The Jester Worm
Question 4. Question :
(TCO 1) What is a solar sunrise?
An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel.
Electronic interference resulting from solar flares and occurring most commonly in the early morning hours.
A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures.
The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice.
Question 5. Question :
(TCO 1) A successful attack on a network may adversely impact security in all the following ways except _____.
loss of confidentiality
loss of integrity
loss of functionality
loss of availability
Question 6. Question :
(TCO 1) The first step an administrator can take to reduce possible attacks is to _____.
ensure that all patches for the operating system and the applications are installed
install a firewall
install antispyware software
configure an intrusion-detection system
Question 7. Question :
(TCO 1) A hacker is anyone who
attempts to break into computers for malicious reasons.
attempts to steal data for any reason.
attempts to take over systems without permission.
All of the above
Question 8. Question :
(TCO 1) Which of the following is considered sensitive information?
Medical records
Driver’s license number
Passport number
All of the above
Question 9. Question :
(TCO 1) To ensure the privacy of your driver’s license number during electronic communications, you want to _____ the data.
hide
encrypt
mask
not print
Instructor Explanation: Lesson 1, Who Are Attackers?
Question 10. Question :
(TCO 1) Date encryption standard (DES) is a(n) _____ algorithm.
masking
encryption
hashing
switching
-
Rating:
/5
Solution: SEC280 Week 1 Quiz latest 2016 september (all correct answers)