|\ |\ |\ |\
ANSWERS
|\
Everyone who frequents underground forums is cybercriminal or
|\ |\ |\ |\ |\ |\ |\ |\
intends to be one. - CORRECT ANSWERS ✔✔False
|\ |\ |\ |\ |\ |\ |\
For DDoS traceback (Savage et al. '00) a path can be reconstructed
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
even if just one packet through the path is obtained. - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔False |\
If a botnet uses randomly generated domains each day for
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
command-and-control (C&C), then there is no way to detect and |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
block the C&C domains. - CORRECT ANSWERS ✔✔False
|\ |\ |\ |\ |\ |\ |\
DoS attacks always use spoofed IP addresses. - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔False |\
For DoS mitigation, a SYN Cookie ensures that a client is honest
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
because it must ACK the SYN-ACK cookie from the server, and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
cannot reuse an old one. - CORRECT ANSWERS ✔✔True
|\ |\ |\ |\ |\ |\ |\ |\
, If I click on a phishing link and end up on a site, but I don't provide
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
valuable information such as my credit card number to the site,
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
nothing bad can happen. - CORRECT ANSWERS ✔✔False
|\ |\ |\ |\ |\ |\ |\
Cyber frauds and scams such as on-line "pharmacy" can only fool
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the victims once - that is, no users will be their repeat "customers". -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔False
|\ |\ |\
Denial-of-Service attacks always involve sending a very large |\ |\ |\ |\ |\ |\ |\ |\
amount of traffic. - CORRECT ANSWERS ✔✔False
|\ |\ |\ |\ |\ |\
A lot of cybercrime contents on the web remain invisible to even a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
very powerful search engine like Google. - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔True
Denial-of-Service attacks can only happen at the network layer. - |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔False |\ |\
A penetration test is always launched from outside the enterprise
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
network being tested. - CORRECT ANSWERS ✔✔False
|\ |\ |\ |\ |\ |\
A penetration test can combine physical as well as cyber/network
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
access to the organization being tested. - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔True