Security + 280 Exams
Top of Form
Grading Summary
These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below. | Date Taken: | 9/8/2012| Time Spent:| 09 min , 54 secs |
Points Received:| 30 / 30 (100%) |
|
Question Type:| # Of Questions:| # Correct:|
Multiple Choice| 10| 10|
|
|
Grade Details - All Questions |
1.| Question :| (TCO 1) What is the most common threat to information security in an organization?|
|
| Student Answer:| | Computer viruses |
| | | Power surges |
| | | Forgotten passwords |
| | | SPAM |
| Instructor Explanation:| Page 7|
|
|
| Points Received:| 3 of 3 |
| Comments:| |
|
|
2.| Question :| (TCO 1) The term script kiddies refers to _____.|
|
| Student Answer:| | a hacker with low-end technical ability | | | | a children's television show |
| | | a type of video game |
| | | an Internet site for peer-to-peer music sharing | | Instructor Explanation:| Page 7|
|
|
| Points Received:| 3 of 3 |
| Comments:| |
|
|
3.| Question :| (TCO 1) What is a port scan?|
|
| Student Answer:| | It identifies what ports can be used to smuggle information across borders. | | | | It identifies ports that are open and services that are running. | | | | It identifies the USB, parallel, and serial ports that can be used to connect to the system. | | | | It identifies the IP addresses of computers on the network. | | Instructor Explanation:| Page 12|
|
|
| Points Received:| 3 of 3 |
| Comments:| |
|
|
4.| Question :| (TCO 1) What is a Solar Sunrise?|
|
| Student Answer:| | An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel | | | | Electronic interference resulting from solar flares and occurring most commonly in the early morning hours | | | | A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures | | | | The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice | | Instructor Explanation:| Page 3|
|
|
| Points Received:| 3 of 3 |
| Comments:| |
|
|
5.| Question :| (TCO 1) What is an elite hacker?|
|
| Student Answer:| | A hacker with a high level of technical ability | | | | A hacker who is wealthy and who is politically motivated | | | | A hacker who has elitist ideas and hacks for political purposes | | | | A hacker who searches for scripts and ready-made tools to use for attacks | | Instructor Explanation:| Page 8|
|
|
| Points Received:| 3 of 3 |
| Comments:| |
|
|
6.| Question :| (TCO 1) When information is disclosed to individuals who are not authorized to see it, a _____ has been suffered.|
|
| Student Answer:| | loss of confidentiality |
| | | loss of integrity |
| | | loss of functionality |
| | | loss of availability |
| Instructor Explanation:| Page 14|
|
|
| Points Received:| 3 of 3 |
| Comments:| |
|
|
7.| Question :| (TCO 1) According to the Computer Crime and Security Survey, the four types of attacks that increased from 2007 to 2008 were _____.|
|
| Student Answer:| | viruses, insider abuse, laptop theft, and unauthorized access | | | | unauthorized access, theft and the loss of proprietary information, the misuse of Web applications, and DNS attacks | | | | viruses, insider abuse, misuse of Web applications, and DNS attacks | | | | laptop theft, unauthorized access, theft, and loss of...
Please join StudyMode to read the full document