,CHAPTER 1 P
1. CorruptionPofPinformationPcanPoccurPonlyPwhilePinformationPisPbeingPstor
ed.
a. True
*b.PFalse
2. ThePauthorizationPprocessPtakesPplacePbeforePthePauthenticationPpro
cess.
a. True
*b.PFalse
3. APwormPmayPbePablePtoPdepositPcopiesPofPitselfPontoPallPWebPserversPthatPth
ePinfectedPsystemPcanPreach,PsoPthatPusersPwhoPsubsequentlyPvisitPthosePsite
sPbecomePinfected.
*a.PTrue
b.PFalse
4. DoSPattacksPcannotPbePlaunchedPagainstProuters.
a. True
*b.PFalse
5. ThePfirstPstepPinPsolvingPproblemsPisPtoPgatherPfactsPandPmakePassum
ptions.
a. True
*b.PFalse
6. APdeviceP(orPaPsoftwarePprogramPonPaPcomputer)PthatPcanPmonitorPdataPtravel
ingPonPaPnetworkPisPknownPasPaPsocketPsniffer.PP
a. True
*b.PFalse
7. OnePformPofPe-
mailPattackPthatPisPalsoPaPDoSPattackPisPcalledPaPmailPspoof,PinPwhichPanPattac
kerPoverwhelmsPthePreceiverPwithPexcessivePquantitiesPofPe-mail.PP
a. True
*b.PFalse
,8. WhenPvoltagePlevelsPlagP(experiencePaPmomentaryPincrease),PthePextraPvolt
agePcanPseverelyPdamagePorPdestroyPequipment.PP
a. True
*b.PFalse
9. "ShoulderPspying"PisPusedPinPpublicPorPsemi-
publicPsettingsPwhenPindividualsPgatherPinformationPtheyParePnotPauthoriz
edPtoPhavePbyPlookingPoverPanotherPindividual’sPshoulderPorPviewingPthePinf
ormationPfromPaPdistance.PP
a. True
*b.PFalse
10. ThePtermPphreakerPisPnowPcommonlyPassociatedPwithPanPindividualPwhoPcrack
sPorPremovesPsoftwarePprotectionPthatPisPdesignedPtoPpreventPunauthorizedPdu
plication.PP
a. True
*b.PFalse
11. ThePapplicationPofPcomputingPandPnetworkPresourcesPtoPtryPeveryPposs
iblePcombinationPofPoptionsPofPaPpasswordPisPcalled
aPdictionaryPattack.PP
a. True
*b.PFalse
12. ThePmacroPvirusPinfectsPthePkeyPoperatingPsystemPfilesPlocatedPinPaPcompu
ter’sPstart-upPsector.PP
a. True
*b.PFalse
13. ThePmaliciousPcodePattackPincludesPthePexecutionPofPviruses,Pworms,PTroj
anPhorses,PandPactivePWebPscriptsPwithPthePintentPtoPdestroyPorPstealPinforma
tion.PP
*a.PTrue
b. False
14. A(n)PpolymorphicPthreatPisPonePthatPoverPtimePchangesPthePwayPitPappea
rsPtoPantivirusPsoftwarePprograms,PmakingPitPundetectablePbyPtechniquesPt
hatPlookPforPpre-configuredPsignatures.PP
*a.PTrue
b.PFalse
, 15. CommunicationsPsecurityPinvolvesPthePprotectionPofPwhichPofPthePfollowing?
a. radioPhandsets
b. people,PphysicalPassets
c. thePITPdepartment
*d.Pmedia,Ptechnology,PandPcontent
16. ThePprotectionPofPvoicePandPdataPcomponents,Pconnections,PandPcontentPisPknownPas
P security.
P
*a.Pnetwork
b. national
c. cyber
d. operational
17. ThePprotectionPofPconfidentiality,Pintegrity,PandPavailabilityPofPdataPregardlessPofPit
sPlocationPisPknownPas security.
*a.Pinformation
b. network
c. cyber
d. operational
18. APmodelPofPInfoSecPthatPoffersPaPcomprehensivePviewPofPsecurityPforPdataPwhilePbein
gPstored,Pprocessed,PorPtransmittedPisPthe securityPmodel.
*a.PCNSS
b. USMC
c. USNA
d. NPC
19. WhichPofPthePfollowingPisPaPC.I.A.PtriadPcharacteristicPthatPaddressesPthePthreatPfromP
corruption,Pdamage,Pdestruction,PorPotherPdisruptionPofPitsPauthenticPstate?
*a.Pintegrity
b. availability
c. authentication
d. accountability
20. AccordingPtoPthePC.I.A.Ptriad,PwhichPofPthePfollowingPisPthePmostPdesirablePcharacteristicPforP
privacy?
*a.Pconfidentiality
1. CorruptionPofPinformationPcanPoccurPonlyPwhilePinformationPisPbeingPstor
ed.
a. True
*b.PFalse
2. ThePauthorizationPprocessPtakesPplacePbeforePthePauthenticationPpro
cess.
a. True
*b.PFalse
3. APwormPmayPbePablePtoPdepositPcopiesPofPitselfPontoPallPWebPserversPthatPth
ePinfectedPsystemPcanPreach,PsoPthatPusersPwhoPsubsequentlyPvisitPthosePsite
sPbecomePinfected.
*a.PTrue
b.PFalse
4. DoSPattacksPcannotPbePlaunchedPagainstProuters.
a. True
*b.PFalse
5. ThePfirstPstepPinPsolvingPproblemsPisPtoPgatherPfactsPandPmakePassum
ptions.
a. True
*b.PFalse
6. APdeviceP(orPaPsoftwarePprogramPonPaPcomputer)PthatPcanPmonitorPdataPtravel
ingPonPaPnetworkPisPknownPasPaPsocketPsniffer.PP
a. True
*b.PFalse
7. OnePformPofPe-
mailPattackPthatPisPalsoPaPDoSPattackPisPcalledPaPmailPspoof,PinPwhichPanPattac
kerPoverwhelmsPthePreceiverPwithPexcessivePquantitiesPofPe-mail.PP
a. True
*b.PFalse
,8. WhenPvoltagePlevelsPlagP(experiencePaPmomentaryPincrease),PthePextraPvolt
agePcanPseverelyPdamagePorPdestroyPequipment.PP
a. True
*b.PFalse
9. "ShoulderPspying"PisPusedPinPpublicPorPsemi-
publicPsettingsPwhenPindividualsPgatherPinformationPtheyParePnotPauthoriz
edPtoPhavePbyPlookingPoverPanotherPindividual’sPshoulderPorPviewingPthePinf
ormationPfromPaPdistance.PP
a. True
*b.PFalse
10. ThePtermPphreakerPisPnowPcommonlyPassociatedPwithPanPindividualPwhoPcrack
sPorPremovesPsoftwarePprotectionPthatPisPdesignedPtoPpreventPunauthorizedPdu
plication.PP
a. True
*b.PFalse
11. ThePapplicationPofPcomputingPandPnetworkPresourcesPtoPtryPeveryPposs
iblePcombinationPofPoptionsPofPaPpasswordPisPcalled
aPdictionaryPattack.PP
a. True
*b.PFalse
12. ThePmacroPvirusPinfectsPthePkeyPoperatingPsystemPfilesPlocatedPinPaPcompu
ter’sPstart-upPsector.PP
a. True
*b.PFalse
13. ThePmaliciousPcodePattackPincludesPthePexecutionPofPviruses,Pworms,PTroj
anPhorses,PandPactivePWebPscriptsPwithPthePintentPtoPdestroyPorPstealPinforma
tion.PP
*a.PTrue
b. False
14. A(n)PpolymorphicPthreatPisPonePthatPoverPtimePchangesPthePwayPitPappea
rsPtoPantivirusPsoftwarePprograms,PmakingPitPundetectablePbyPtechniquesPt
hatPlookPforPpre-configuredPsignatures.PP
*a.PTrue
b.PFalse
, 15. CommunicationsPsecurityPinvolvesPthePprotectionPofPwhichPofPthePfollowing?
a. radioPhandsets
b. people,PphysicalPassets
c. thePITPdepartment
*d.Pmedia,Ptechnology,PandPcontent
16. ThePprotectionPofPvoicePandPdataPcomponents,Pconnections,PandPcontentPisPknownPas
P security.
P
*a.Pnetwork
b. national
c. cyber
d. operational
17. ThePprotectionPofPconfidentiality,Pintegrity,PandPavailabilityPofPdataPregardlessPofPit
sPlocationPisPknownPas security.
*a.Pinformation
b. network
c. cyber
d. operational
18. APmodelPofPInfoSecPthatPoffersPaPcomprehensivePviewPofPsecurityPforPdataPwhilePbein
gPstored,Pprocessed,PorPtransmittedPisPthe securityPmodel.
*a.PCNSS
b. USMC
c. USNA
d. NPC
19. WhichPofPthePfollowingPisPaPC.I.A.PtriadPcharacteristicPthatPaddressesPthePthreatPfromP
corruption,Pdamage,Pdestruction,PorPotherPdisruptionPofPitsPauthenticPstate?
*a.Pintegrity
b. availability
c. authentication
d. accountability
20. AccordingPtoPthePC.I.A.Ptriad,PwhichPofPthePfollowingPisPthePmostPdesirablePcharacteristicPforP
privacy?
*a.Pconfidentiality