knowt logo

Cybersecurity 

Chapter 3 Questions

  1. The main goal of a hacker is to circumvent access controls and potentially steal data.

    • True

  2. Which of the following best describes intellectual property?

     A. The items a business has copyrighted 

    B. Patents owned by a business 

    C. Sales and marketing plans 

    D. Customer lists 

    E.AlloftheaboveE. All of the above
  3. Which of the following terms best describes a person with very little hacking skills?

     A. Hacker 

    B.ScriptkiddieB. Script kiddie 

    C. Cracker 

    D. Wannabe

    E. All of the above
  4. A(n) packet sniffer is a software tool that is used to capture packets from a network.

  5. Which type of attack results in legitimate users not having access to a system resource?

     A.DenialA. Denial 

    B. Disclosure 

    C. Alteration 

    D. Spoofing
  6. A qualitative risk assessment assigns a subjective risk rating to assess the risk.

    • True

  7. Which of the following is an example of social engineering?

     A. SQL injection 

    B. XML injection 

    C. Security design 

    D.ImpersonationD. Impersonation 

    E. All of the above
  8. Which of the following is an example of an administrative security control?

     A. Antivirus/anti-malware protection 

    B. Data leakage prevention 

    C. Standardized workstation and laptop images 

    D.SecurityawarenesstrainingD. Security awareness training

    E. All of the above
  9. Vulnerability assessment scanners look for software vulnerabilities in IP host devices.

    • True

  10. Which of the following affects availability?

    A. Cross-site scripting 

    B. SQL injection 

    C.DenialC. Denial 

    D. Packet sniffing 

    E. None of the above
  11. Which type of attack involves capturing data packets from a network and transmitting them later to produce an unauthorized effect?

    A. Man in the middle 

    B. Denial 

    C.ReplayC. Replay 

    D. Phishing 

    E. SQL injection
  12. The list of known software vulnerabilities maintained by MITRE is called:

    A. National Vulnerability Database (NVD)

    B.CommonVulnerabilitiesandExposures(CVE)B. Common Vulnerabilities and Exposures (CVE)

    C. Zero-Day List (ZDL)

    D. Software Vulnerabilities List (SVL)

S

Cybersecurity 

Chapter 3 Questions

  1. The main goal of a hacker is to circumvent access controls and potentially steal data.

    • True

  2. Which of the following best describes intellectual property?

     A. The items a business has copyrighted 

    B. Patents owned by a business 

    C. Sales and marketing plans 

    D. Customer lists 

    E.AlloftheaboveE. All of the above
  3. Which of the following terms best describes a person with very little hacking skills?

     A. Hacker 

    B.ScriptkiddieB. Script kiddie 

    C. Cracker 

    D. Wannabe

    E. All of the above
  4. A(n) packet sniffer is a software tool that is used to capture packets from a network.

  5. Which type of attack results in legitimate users not having access to a system resource?

     A.DenialA. Denial 

    B. Disclosure 

    C. Alteration 

    D. Spoofing
  6. A qualitative risk assessment assigns a subjective risk rating to assess the risk.

    • True

  7. Which of the following is an example of social engineering?

     A. SQL injection 

    B. XML injection 

    C. Security design 

    D.ImpersonationD. Impersonation 

    E. All of the above
  8. Which of the following is an example of an administrative security control?

     A. Antivirus/anti-malware protection 

    B. Data leakage prevention 

    C. Standardized workstation and laptop images 

    D.SecurityawarenesstrainingD. Security awareness training

    E. All of the above
  9. Vulnerability assessment scanners look for software vulnerabilities in IP host devices.

    • True

  10. Which of the following affects availability?

    A. Cross-site scripting 

    B. SQL injection 

    C.DenialC. Denial 

    D. Packet sniffing 

    E. None of the above
  11. Which type of attack involves capturing data packets from a network and transmitting them later to produce an unauthorized effect?

    A. Man in the middle 

    B. Denial 

    C.ReplayC. Replay 

    D. Phishing 

    E. SQL injection
  12. The list of known software vulnerabilities maintained by MITRE is called:

    A. National Vulnerability Database (NVD)

    B.CommonVulnerabilitiesandExposures(CVE)B. Common Vulnerabilities and Exposures (CVE)

    C. Zero-Day List (ZDL)

    D. Software Vulnerabilities List (SVL)