Cybersecurity
Chapter 3 Questions
The main goal of a hacker is to circumvent access controls and potentially steal data.
True
Which of the following best describes intellectual property?
A. The items a business has copyrighted
B. Patents owned by a business
C. Sales and marketing plans
D. Customer lists
E. All of the above
Which of the following terms best describes a person with very little hacking skills?
A. Hacker
B. Script kiddie
C. Cracker
D. Wannabe
E. All of the above
A(n) packet sniffer is a software tool that is used to capture packets from a network.
Which type of attack results in legitimate users not having access to a system resource?
A. Denial
B. Disclosure
C. Alteration
D. Spoofing
A qualitative risk assessment assigns a subjective risk rating to assess the risk.
True
Which of the following is an example of social engineering?
A. SQL injection
B. XML injection
C. Security design
D. Impersonation
E. All of the above
Which of the following is an example of an administrative security control?
A. Antivirus/anti-malware protection
B. Data leakage prevention
C. Standardized workstation and laptop images
D. Security awareness training
E. All of the above
Vulnerability assessment scanners look for software vulnerabilities in IP host devices.
True
Which of the following affects availability?
A. Cross-site scripting
B. SQL injection
C. Denial
D. Packet sniffing
E. None of the above
Which type of attack involves capturing data packets from a network and transmitting them later to produce an unauthorized effect?
A. Man in the middle
B. Denial
C. Replay
D. Phishing
E. SQL injection
The list of known software vulnerabilities maintained by MITRE is called:
A. National Vulnerability Database (NVD)
B. Common Vulnerabilities and Exposures (CVE)
C. Zero-Day List (ZDL)
D. Software Vulnerabilities List (SVL)
Chapter 3 Questions
The main goal of a hacker is to circumvent access controls and potentially steal data.
True
Which of the following best describes intellectual property?
A. The items a business has copyrighted
B. Patents owned by a business
C. Sales and marketing plans
D. Customer lists
E. All of the above
Which of the following terms best describes a person with very little hacking skills?
A. Hacker
B. Script kiddie
C. Cracker
D. Wannabe
E. All of the above
A(n) packet sniffer is a software tool that is used to capture packets from a network.
Which type of attack results in legitimate users not having access to a system resource?
A. Denial
B. Disclosure
C. Alteration
D. Spoofing
A qualitative risk assessment assigns a subjective risk rating to assess the risk.
True
Which of the following is an example of social engineering?
A. SQL injection
B. XML injection
C. Security design
D. Impersonation
E. All of the above
Which of the following is an example of an administrative security control?
A. Antivirus/anti-malware protection
B. Data leakage prevention
C. Standardized workstation and laptop images
D. Security awareness training
E. All of the above
Vulnerability assessment scanners look for software vulnerabilities in IP host devices.
True
Which of the following affects availability?
A. Cross-site scripting
B. SQL injection
C. Denial
D. Packet sniffing
E. None of the above
Which type of attack involves capturing data packets from a network and transmitting them later to produce an unauthorized effect?
A. Man in the middle
B. Denial
C. Replay
D. Phishing
E. SQL injection
The list of known software vulnerabilities maintained by MITRE is called:
A. National Vulnerability Database (NVD)
B. Common Vulnerabilities and Exposures (CVE)
C. Zero-Day List (ZDL)
D. Software Vulnerabilities List (SVL)