πŸ“Š Information Security
Q. What "layer" of an e-mail message should you consider when evaluating e-mail security?
  • (A) TCP/IP
  • (B) SMTP
  • (C) Body
  • (D) All of the above
πŸ’¬ Discuss
βœ… Correct Answer: (D) All of the above
πŸ“Š Information Security
Q. This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
  • (A) Private key
  • (B) Digital certificate
  • (C) Smart card
  • (D) Ownership tag
πŸ’¬ Discuss
βœ… Correct Answer: (B) Digital certificate
πŸ“Š Information Security
Q. This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.
  • (A) Bastion host
  • (B) Packet monkey
  • (C) Dongle
  • (D) Zombie
πŸ’¬ Discuss
βœ… Correct Answer: (D) Zombie
πŸ“Š Information Security
Q. This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.
  • (A) Hijacking
  • (B) Identity theft
  • (C) Smurf attack
  • (D) Tunneling
πŸ’¬ Discuss
βœ… Correct Answer: (A) Hijacking
πŸ“Š Information Security
Q. This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
  • (A) Foot printing
  • (B) Non repudiation
  • (C) E-mail spoofing
  • (D) Finger
πŸ’¬ Discuss
βœ… Correct Answer: (C) E-mail spoofing
πŸ“Š Information Security
Q. This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.
  • (A) Buffer overflow
  • (B) Block cipher
  • (C) War dialing
  • (D) Distributed denial-of-service attack
πŸ’¬ Discuss
βœ… Correct Answer: (A) Buffer overflow
πŸ“Š Information Security
Q. This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.
  • (A) Identity theft
  • (B) Cookie poisoning
  • (C) Shoulder surfing
  • (D) Relative identifier
πŸ’¬ Discuss
βœ… Correct Answer: (B) Cookie poisoning
πŸ“Š Information Security
Q. This is a program in which harmful code is contained inside apparently harmless programming or data.
  • (A) Snort
  • (B) Honeypot
  • (C) Blue bomb
  • (D) Trojan horse
πŸ’¬ Discuss
βœ… Correct Answer: (D) Trojan horse
πŸ“Š Information Security
Q. This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.
  • (A) Port scan
  • (B) Denial of service
  • (C) Exploit
  • (D) Logic bomb
πŸ’¬ Discuss
βœ… Correct Answer: (C) Exploit
πŸ“Š Information Security
Q. The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.
  • (A) Cookie
  • (B) Key fob
  • (C) Watermark
  • (D) Patch
πŸ’¬ Discuss
βœ… Correct Answer: (D) Patch