CS 110 EXAM 1 QUESTIONS AND ANSWERS 100%
VERIFIED
________ are viruses that masquerade as useful programs or
files. ......ANSWER........Trojan horses
A person claiming to be from central IT called Chris and asked
him to participate in a password reset audit. The person had
Chris change his password to the word "123456", and then
again to a secret passphrase only Chris knew. Later that day
Chris noticed odd system behavior, and then the system crashed.
Chris was a victim of ________. ......ANSWER........pretexting
Jason attempts to hack into a banking site to steal customer
information. He finds the security of the Web site lacking and is
able to access the site with ease. Jason is arrested the next day
and charged with computer crime. The banking site was able to
,age 2 of 35
track Jason's IP address because he had unknowingly attacked a
________. ......ANSWER........honeypot
The computers that run the DBMS and all devices that store
database data should reside in locked, controlled-access
facilities. This is done to ________. ......ANSWER........provide
physical security
Key escrow is a(n) ________. ......ANSWER........safety procedure
that allows a trusted party to have a copy of the encryption key
Data protection laws may be stronger in other countries than in
the United States. ......ANSWER........True
One of the personal security safeguards is to use https at
trusted, reputable vendors. ......ANSWER........True
,age 3 of 35
The process of hardening a Web site is a ________ safeguard.
......ANSWER........technical
Technical safeguards involve the hardware and software
components of an information system. ......ANSWER........True
Which of the following statements is TRUE about data
administration? ......ANSWER........It is involved in establishing
data safeguards.
Improper data disclosure and data damage and loss are
possible consequences of an SQL injection attack.
......ANSWER........True
PL Technologies suffered considerable data loss when its
database was infected by a virus. George, an operations
personnel, attempts to fix the damage by retrieving information
, age 4 of 35
from backed up data. George is involved in the process of
________. ......ANSWER........recovery
In a special version of asymmetric encryption, each site has a
________ for encoding messages. ......ANSWER........public key
Which of the following is used for biometric authentication?
......ANSWER........facial features
Which of the following is a personal security safeguard?
......ANSWER........removing high-value assets from computers
A denial-of-service attack is launched when a hacker takes
computers with wireless connections through an area and
searches for unprotected wireless networks.
......ANSWER........False