QUESTIONS AND ANSWERS 100%
CORRECT
In which type of attack does the attacker gather extensive sensitive personal
information about its victim?
A) identity theft
B) credit card number theft
C) both A and B
D) neither A nor B - correct answer A) identity theft
Which is more harmful to the victim?
A) identity theft
B) credit card number theft
C) both A and B are about equally harmful - correct answer A) identity theft
,T/F Hacking is defined as using a computer resource without authorization or in
excess of authorization. - correct answer FALSE
Which of the following meets the definition of hacking?
A) to intentionally use a computer resource without authorization
B) to intentionally use a computer on which you have an account but use it for
unauthorized purposes
C) both A and B
D) neither A nor B - correct answer C) both A and B
If you see a username and password on a Post-It note that anyone can see on a
monitor, is it hacking if you use this information to log in?
A) yes
B) no
C) We cannot say from the information given. - correct answer A) yes
,You accidentally discover that you can get into other e-mail accounts after you have
logged in under your account and only spend a few minutes looking at another user's
mail. Is that hacking?
A) yes
B) no
C) We cannot say from the information given. - correct answer A) yes
A debit card is secure because it requires two credentials for authentication-the card
itself and a PIN. This is called ________.
A) segmentation
B) redundancy
C) two-factor authentication
D) none of the above - correct answer C) two-factor authentication
, In antivirus filtering, the best ways to filter currently use ________.
A) application awareness
B) stateful inspection
C) signature detection
D) behavioral detection - correct answer D) behavioral detection
Antivirus programs are designed to detect ________.
A) viruses
B) worms
C) both A and B
D) neither A nor B - correct answer C) both A and B
Which of the following is the most frustrating to use?
A) idss
B) opaque filtering