Cyber security part 1
1. ____________ encompasses spyware, adware, dialers, joke programs, remote access tools,
and any other unwelcome files and programs apart from viruses that are designed to harm
the performance of computers on your network.
a. Spyware
b. Adware
c. Grayware
d. Malware
2. When the sender and the recipient can transmit data to each other over an unsecured or
monitored link by encrypting messages without worrying that their communications are
being monitored, it is called:
a. authentication
b. confidentiality
c. integrity
d. nonrepudiation
3. Which one of the following is a primary mechanism for a malicious code to enter a desktop?
a. e-mail messages
b. e-mail attachments
c. worms
d. Trojan horses
4. Networks that allow access to some database materials and e-mail are called:
a. campus networks
b. trusted networks
c. semi-trusted networks
d. untrusted networks
5. Which one of the following is a message signed with a sender's private key that can be
verified by anyone who has access to the sender's public key, thereby proving that the sender
had access to the private key (and therefore is likely to be the person associated with the
public key used), and the part of the message that has not been tampered with?
a. Linked Keys
b. Public Key Encryption
c. CryptoSystems
d. Digital Signature
6. An individual's ______________ is unique.
a. shoe size
b. hair color
c. fingerprint
d. eye color
7. A ____________________ is a duplicate of some or all of a main database's data stored on
a separate computer from the main database.
a. database backup
b. data warehouse
c. DFS
d. disk mirror
8. A prolonged increase in the voltage level is called a:
a. fault
b. sag
c. spike
d. surge
9.What is the default cipher for the IPSec?
a. PGP
b. ESP
c. 3DES
d. DES-CBC
10. When it comes to magnetic media sanitization, what difference can be made between clearing
and purging information?
a. Clearing renders information unrecoverable against a laboratory attack and purging
renders information unrecoverable to a keyboard attack.
b. Clearing completely erases the media whereas purging only removes file
headers, allowing the recovery of files.
c. Clearing renders information unrecoverable by a keyboard attack and purging renders
information unrecoverable against laboratory attack.
d. They both involve rewriting the media.
11. Nimda was an example of a:
a. virus
b. Trojan horse
c. worm
d. bug
12. A well-known exploit that uses IP packet fragmentation techniques to crash remote systems is
called a(n):
a. smurf
b. ping of death
c. spoofing
d. ARP poisoning
13. What is an attack method that causes a switch to send data to a network sniffer?
a. ARP spoofing
b. denial of service
c. MAC spoofing
d. NIC duplicating
14. What is typically used for home networks to allow multiple users to share one IP address?
a. NAT
b. PAT
c. VPN
d. VLAN
15. What term refers to a server placed into service for the purpose of attracting a potential
intruder's attention?
a. hidey hole
b. trap door
c. lame duck
d. honey pot
16. When an attacker targets an e-mail communication that uses POP3, which TCP port is he or she
likely to use in the attack?
a. 18
b. 110
c. 35
d. 1258.
17. What does MD5 stand for?
a. Media Display version 5
b. Media Digest Algorithm 5
c. Message Digest Algorithm 5
d. Message Destruction version 5
18. What does PGP stand for?
a. None of the answers are correct.
b. Pretty Good Protection
c. Pretty Good Privacy
d. Pretty Good Practices
19. Which one of the following is a common attack against Web servers?
a. buffer overflow
b. spam attack
c. brute force attack
d. dictionary attack
20. This is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
A. intrusion detection
B. security identifier
C. antigen
D. antivirus software
Cyber Security Answer Key
1. C
2. B
3. B
4. C
5. D
6. C
7. B
8. D
9. D
10. C
11. C
12. B
13. A
14. B
15. D
16. B
17. C
18. C
19. A
20. D