Cybersecurity 

Chapter 3 Questions


1. The main goal of a hacker is to circumvent access controls and potentially steal data.
* True
2. Which of the following best describes intellectual property?

```css
A. The items a business has copyrighted 

B. Patents owned by a business 

C. Sales and marketing plans 

D. Customer lists 

E. All of the above
```
3. Which of the following terms best describes a person with very little hacking skills?

```
A. Hacker 

B. Script kiddie 

C. Cracker 

D. Wannabe

E. All of the above
```
4. A(n) *packet sniffer* is a software tool that is used to capture packets from a network.
5. Which type of attack results in legitimate users not having access to a system resource?

```
A. Denial 

B. Disclosure 

C. Alteration 

D. Spoofing
```
6. A qualitative risk assessment assigns a subjective risk rating to assess the risk.
* True
7. Which of the following is an example of social engineering?

```
A. SQL injection 

B. XML injection 

C. Security design 

D. Impersonation 

E. All of the above
```
8. Which of the following is an example of an administrative security control?

```
A. Antivirus/anti-malware protection 

B. Data leakage prevention 

C. Standardized workstation and laptop images 

D. Security awareness training

E. All of the above
```
9. Vulnerability assessment scanners look for software vulnerabilities in IP host devices.
* True
10. Which of the following affects availability?

```
A. Cross-site scripting 

B. SQL injection 

C. Denial 

D. Packet sniffing 

E. None of the above
```
11. Which type of attack involves capturing data packets from a network and transmitting them later to produce an unauthorized effect?

```
A. Man in the middle 

B. Denial 

C. Replay 

D. Phishing 

E. SQL injection
```
12. The list of known software vulnerabilities maintained by MITRE is called:

```
A. National Vulnerability Database (NVD)

B. Common Vulnerabilities and Exposures (CVE)

C. Zero-Day List (ZDL)

D. Software Vulnerabilities List (SVL)
```

\
robot