ISM 4220 EXAM 3 QUESTIONS AND ANSWERS
Which is the A in CIA?
Availability
Agency
Authenticity
Avarice - Answers - Availability
Which of the following is not a type of malware?
Virus
Worm
Ransomware
Spider - Answers - Spider
What was the name of the first worm?
Stuxnet
PHIL
MORRIS
WannaCry - Answers - MORRIS
A threat is any potential occurrence that can do harm, interrupt the systems using the
network, or cause a monetary loss to the organization.
True
False - Answers - True
Which is a threat to availability?
IDS
Router
DoS
Phishing - Answers - DoS
Two factor authentication primarily uses phones.
True
False - Answers - True
TLS is the main encryption protocol used by web browsers.
True
, False - Answers - True
Symmetric encryption is better than asymmetric encryption.
True
False - Answers - False
Which of the following is not a type of firewall?
NAT
Packet
Application
Cold - Answers - Cold
A public and private key are both generated at the same time.
True
False - Answers - True
Cryptocurrencies like Bitcoin can be considered financial infrastructure.
True
False - Answers - True
Which of the following is not a HFT strategy?
Market Making
Directional
Rapid Velocity
Arbitrage - Answers - Rapid Velocity
Satoshi Nakamoto is a man who lives in Japan.
True
False - Answers - False
- Underlying technology that enables cryptocurrency like Bitcoin
- Originally proposed in 1982 by David Chaum
- Decentralized
- Ledger is very secure (use of digital signatures)
- Organize ledger into blocks that become part of the blockchain - Answers - Blockchain
- listen for transactions and perform math until they find specific sequence; becomes a
block
- System rewards block creator with cryptocurrency to incentivize participation
Which is the A in CIA?
Availability
Agency
Authenticity
Avarice - Answers - Availability
Which of the following is not a type of malware?
Virus
Worm
Ransomware
Spider - Answers - Spider
What was the name of the first worm?
Stuxnet
PHIL
MORRIS
WannaCry - Answers - MORRIS
A threat is any potential occurrence that can do harm, interrupt the systems using the
network, or cause a monetary loss to the organization.
True
False - Answers - True
Which is a threat to availability?
IDS
Router
DoS
Phishing - Answers - DoS
Two factor authentication primarily uses phones.
True
False - Answers - True
TLS is the main encryption protocol used by web browsers.
True
, False - Answers - True
Symmetric encryption is better than asymmetric encryption.
True
False - Answers - False
Which of the following is not a type of firewall?
NAT
Packet
Application
Cold - Answers - Cold
A public and private key are both generated at the same time.
True
False - Answers - True
Cryptocurrencies like Bitcoin can be considered financial infrastructure.
True
False - Answers - True
Which of the following is not a HFT strategy?
Market Making
Directional
Rapid Velocity
Arbitrage - Answers - Rapid Velocity
Satoshi Nakamoto is a man who lives in Japan.
True
False - Answers - False
- Underlying technology that enables cryptocurrency like Bitcoin
- Originally proposed in 1982 by David Chaum
- Decentralized
- Ledger is very secure (use of digital signatures)
- Organize ledger into blocks that become part of the blockchain - Answers - Blockchain
- listen for transactions and perform math until they find specific sequence; becomes a
block
- System rewards block creator with cryptocurrency to incentivize participation