Security + 280 Exams

Only available on StudyMode
  • Topic: Cryptography, Substitution cipher, Encryption
  • Pages : 19 (2838 words )
  • Download(s) : 20
  • Published : October 29, 2012
Open Document
Text Preview
-------------------------------------------------
Top of Form

Grading Summary
These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below. | Date Taken: | 9/8/2012| Time Spent:| 09 min , 54 secs |

Points Received:| 30 / 30  (100%) |
|
Question Type:| # Of Questions:| # Correct:|
Multiple Choice| 10| 10|
|
|

Grade Details - All Questions |

 1.| Question :| (TCO 1) What is the most common threat to information security in an organization?|
|
 | Student Answer:| | Computer viruses |
 | | | Power surges |
 | | | Forgotten passwords |
 | | | SPAM |
 | Instructor Explanation:| Page 7|
|
|
 | Points Received:| 3 of 3 |
 | Comments:| |
|
|
 2.| Question :| (TCO 1) The term script kiddies refers to _____.|
|
 | Student Answer:| | a hacker with low-end technical ability |  | | | a children's television show |
 | | | a type of video game |
 | | | an Internet site for peer-to-peer music sharing |  | Instructor Explanation:| Page 7|
|
|
 | Points Received:| 3 of 3 |
 | Comments:| |
|
|
 3.| Question :| (TCO 1) What is a port scan?|
|
 | Student Answer:| | It identifies what ports can be used to smuggle information across borders. |  | | | It identifies ports that are open and services that are running. |  | | | It identifies the USB, parallel, and serial ports that can be used to connect to the system. |  | | | It identifies the IP addresses of computers on the network. |  | Instructor Explanation:| Page 12|

|
|
 | Points Received:| 3 of 3 |
 | Comments:| |
|
|
 4.| Question :| (TCO 1) What is a Solar Sunrise?|
|
 | Student Answer:| | An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel |  | | | Electronic interference resulting from solar flares and occurring most commonly in the early morning hours |  | | | A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures |  | | | The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice |  | Instructor Explanation:| Page 3|

|
|
 | Points Received:| 3 of 3 |
 | Comments:| |
|
|
 5.| Question :| (TCO 1) What is an elite hacker?|
|
 | Student Answer:| | A hacker with a high level of technical ability |  | | | A hacker who is wealthy and who is politically motivated |  | | | A hacker who has elitist ideas and hacks for political purposes |  | | | A hacker who searches for scripts and ready-made tools to use for attacks |  | Instructor Explanation:| Page 8|

|
|
 | Points Received:| 3 of 3 |
 | Comments:| |
|
|
 6.| Question :| (TCO 1) When information is disclosed to individuals who are not authorized to see it, a _____ has been suffered.|
|
 | Student Answer:| | loss of confidentiality |
 | | | loss of integrity |
 | | | loss of functionality |
 | | | loss of availability |
 | Instructor Explanation:| Page 14|
|
|
 | Points Received:| 3 of 3 |
 | Comments:| |
|
|
 7.| Question :| (TCO 1) According to the Computer Crime and Security Survey, the four types of attacks that increased from 2007 to 2008 were _____.|
|
 | Student Answer:| | viruses, insider abuse, laptop theft, and unauthorized access |  | | | unauthorized access, theft and the loss of proprietary information, the misuse of Web applications, and DNS attacks |  | | | viruses, insider abuse, misuse of Web applications, and DNS attacks |  | | | laptop theft, unauthorized access, theft, and loss of...
tracking img