malware is a generic term for software that has a malicious purpose - Answer true
what device can connect many computers and sends data only out of one port? -
Answer switch
one defense against denial-of-survival is to ______ ICMP packets - Answer block
what is spyware? - Answer Any software that monitors your system
a(n) hides the internal networks IP address and presents a single IP address to the
outside world - Answer proxy server
which TCP/IP protocol operates on port 25 and sends email - Answer SMTP
Which TCIP/IP protocol operates on port 80 and displays web pages? - Answer HTTP
Someone who breaks into a system illegally to assess security deficiencies is a
sneaker. - Answer False
confidentiality, integrity, and availability are three pillars of the CIA triangle - Answer true
unshielded twisted-pair cable with a specification of 100 MHz/100 Mbps is also called
category ______ - Answer 5
what is a penetration tester - Answer a person who hacks a system to test its
vulnerabilities
the IP command line command to determine the number of hops it takes to get from
your computer to its destination is ping. - Answer false
your company is instituting a new security awareness program. you are responsible for
educating end users variety of threats, including social engineering. which of the
following best defines social engineering? - Answer using people skills to obtain
proprietary information
the technique for breaching a systems security by exploiting human nature rather than
technology is war-driving. - Answer true
mcAfee and Norton are examples of_______ - Answer anti-virus scanners
a virus is any file that can self replicate - Answer true
MAC addresses are unique dresses for each NIC. - Answer True
a program that looks benign but actually has a malicious purpose is a ______ - Answer
Trojan horse
, Cybersecurity Final
when a hacking technique uses persuasion and deception to get a person to provide
information to help compromise security, this is referred to as what? - Answer social
engineering
if your computer has an ip address 169.254.130.1 what has happened? - Answer DHCP
failover has automatically assigned an address
the most desirable approach to security is one that is which of the following? - Answer
layered and dynamic
a firewall can be configured to disallow certain types of incoming traffic that may be
attacking - Answer true
someone who calls himself a hacker but lacks the expertise is a ______ - Answer script
kiddy
someone who gains access to a system and causes harm is a _____? - Answer black
hat hacker
a denial of service attack is one of the most common attacks on a system. - Answer true
an IP address consists of four numbers, separated by dots. Each number is called
a(n)_____. - Answer octet
what is the binary equivalent of the decimal number 240? - Answer 11110000
one extreme viewpoint about computer security is - Answer the are no imminent
dangers to your system
the simplest device for connecting computers is a - Answer hub
a protocol that translates web addresses into IP address is called - Answer DNS
which utility gives you information about your machines network configuration? - Answer
IPconfig
the most common internet investment fraud is the - Answer Nigerian fraud
what is the top fuel for avoiding internet fraud? - Answer if it seems too good to be true,
it probably is.
what is cyberstalking? - Answer any use of electronic communications to stalk a person
what can you do on your personal computer to protect your privacy? - Answer set your
browser security setting