SlideShare a Scribd company logo
am
Resources        Lessons      Quizzes     Assignments            Discussion    Completion
                                                                                      Log Out
          Advanced PC Security

completion: final exam results
                                               d
Final Exam



Evaluation of your answers:



            1. What term do you use to describe the hacking method where one participant is
               ethical and the other is unethical?

               You chose: Gray hat.

               Correct! Gray hat hacking is the term used when the person on the inside is
               ethical and the person on the outside is unethical. While both work together, the
               methods and the results are very questionable.



            2. What do you call the three types of intrusions?

               You chose: Physical, remote, and system.

               Correct! These are the types of intrusions based on how hackers gain access to
               the network.



            3. Under the U.S. Computer Fraud and Abuse Act, what is the penalty for illegal
               hacking?

               You chose: Fines, imprisonment, or both.

               Correct! Violation of the U.S. Computer Fraud and Abuse Act will result in
               fines, imprisonment, or both, depending upon the violation.
4. Which term describes an attack using emotions, trust, kindness, and friendship?

   You chose: A psychological social engineering attack.

   Correct! A psychological social engineering attack uses psychology to access
   the needed hacking information.



5. As an auditor, what is your primary concern about using social engineering
   methods in your audit?

   You chose: Ethics.

   Correct! The ethical consideration is not only what management may do with
   the information, but how your colleagues will feel about what you did.



6. What are the two simplest ways to secure a wireless network?

   You chose: Change the default username and password and disable the
   broadcast of your SSID.

   Correct! When you really want to secure your network, you need to follow
   these two steps carefully.



7. What are the names of the processes Google uses to index the Web and produce
   results?

   You chose: Gather, index, and query.

   Correct! The googlebot gathers the pages and links, feeds the document to the
   indexer for processing, and then uses the query to produce the results from
   several high-speed multi-processor computers.



8. What is a packet sniffer?

   You chose: A program that captures packets of traffic in and out of your
   computer.

   Correct! A packet sniffer or packet capture program captures traffic (through
packets) in and out of your computer. (Lesson 3, Chapter 3)



9. How do you surf the Internet anonymously?

   You chose: Use a proxy server.

   Correct! When using a proxy server, the server downloads the pages and passes
   them to you, which guards your anonymity.



10. What kind of search is represented by the following: employee ANDpassword
    ORpasscode?

   You chose: A Boolean search.

   Correct! George Boole is the founding father of this popular search capability.



11. What can you use to find out if a network IP address is active?

   You chose: Network Query Tool.

   Correct! Through a series of network tests including a ping, tracert, and port
   check, the Network Query Tool will tell you if a network address is active and
   receiving traffic.



12. What types of searches can be done through registrars?

   You chose: IP, NIC, and Domain.

   Correct! You can search for owners of network domains by IP and domain
   (Web) addresses and nicknames.



13. What two layers operate within the Data Link Layer of the OSI model?

   You chose: Media Access Control (MAC) and Logical Link Control (LLC).

   Correct! In the Data Link Layer, MAC and LLC help with traffic control to
ensure smooth data flow.



14. In the binary numbering system, which digit is an electrical off switch?

   You chose: 0.

   Correct! In the binary numbering system, 0 is the electrical off and the digit
   one is an electrical on switch.



15. Which term defines a set of methods and guidelines for computing?

   You chose: Protocol.

   Correct! Protocol, in its simplest definition, is a set of methods and guidelines
   that let computers talk to each other.



16. What type of packet is used to establish a network connection?

   You chose: SYN and ACK.

   Correct! These are the processes performed by TCP protocol to establish a
   network connection between two network devices.



17. What part of the packet allows a hacker to gather information and gain control?

   You chose: The IP header.

   Correct! The IP header contains all the information a hacker needs to collect
   network information and gain control by manipulating flags, forging IP
   addresses, and changing offset numbers in fragments.



18. What is the definition of spoofing?

   You chose: Forging a packet's source or destination IP address.
Correct! Spoofing is a common way for hackers to gain access to your system.



19. Which of the following is an example of an exploit?

   You chose: A packet spoofing utility

       20. Correct! They provide the ability to change the IP headers to anything
           the user wants.



21. What term defines unexpected behavior from a system or software using
    reasonable security policies?

   You chose: Universal vulnerability.

   Correct! A universal vulnerability is defined as unexpected behavior from a
   system or software using reasonable security policies.



22. What do you call a piece of programming code that does not handle excessive
    input of data?

   You chose: Unchecked buffer.

   Correct! An unchecked buffer is a piece of programming code that is used as a
   placeholder for programming values to be used in memory.



23. What is the name of the channels used to transfer data between input or output
    devices and the processor?

   You chose: Ports.

   Correct! Ports allow data to flow freely when they're open.



24. Which word defines a program that runs unattended in the background to
    perform continuous or periodic system-wide functions, such as network
    control?
You chose: Daemon.

   Correct! This allows networks to run efficiently without needing human
   intervention.



25. What term describes scanning a network for ports and known services?

   You chose: Service discovery.

   Correct! When you perform a service discovery, you scan your network ports
   for known services like FTP and HTTP.



26. What do you call the icons, buttons, and graphics you use to execute computer
    commands?

   You chose: GUI.

   Correct! The icons, buttons, and graphics that provide user-friendly short cuts
   to your programs are called GUI.



27. What do you call the daemon that maintains a database and allows clients to
    find servers?

   You chose: Endpoint Mapper

       28. Correct : The RPC endpoint mapper is a daemon that maintains a database
           called the local endpoint map, which allows clients to find servers




29. What provides the inner networking protocol that ties the client-server program
    together under RPC using TCP/IP?

   You chose: Stack.

   Incorrect. A stack is a layer of memory or networking protocol that provides
   access to the sockets. The correct answer is: DCOM. (Lesson 9, Chapter 4)
30. What is the main problem with public and private community strings?

   You chose: The authentication is weak.

   Correct! The authentication is weak because anyone can modify data, which
   means hackers can manipulate it at will.



31. Which type of rootkit is the most powerful?

   You chose: Kernel-mode.

   Correct! Kernel-mode rootkits are the most powerful since the native API can't
   intercept them and they directly manipulate the data structure.



32. What type of rootkit activates every time the system boots?

   You chose: Persistent.

   Correct! A persistent rootkit contains code that executes automatically when
   the system starts.



33. What are the duties of the security team?

   You chose: Policy development, practice, and response.

   Correct! The security team is the first responder whan a breach or other
   security incident occurs.



34. Which word defines data viewed by unauthorized personnel, data corruption, or
    data loss?

   You chose: Compromised.

   Correct! Compromised data that has questionable integrity.



35. Which best practice would prevent users from playing music CDs on their
systems by imposing a penalty for doing so?

               You chose: A written reasonable use policy.

               Correct! This policy must detail forbidden actions and consequences to have
               full force.



           36. Which term means the collection and analysis of data in a manner that is
               admissible in court?

               You chose: Computer forensics.

               Correct! CERT defines computer forensics as the collection and analysis of
               data from computer systems, networks, wireless, and storage media in a manner
               that is admissible in court.



           37. What are records of regularly conducted activity called in court?

               You chose: Exception

                   38. Correct: Basically, they are records of regularly conducted activity.



           39. Which of the following determines the admissibility of data in court?

               You chose: FRE.

               Correct! FRE determines the admissibility of computer data in court, and is a
               basic foundation for laws on computer crimes.



Your score: 97 % (out of 100%). Good work.

Final Exam
Date submitted: 12/28/2011 05:16:28 AM (PST)

Please print this evaluation for your records.
                resources | lessons | quizzes | assignments | discussion | completion

 Copyright © 1997 - 2011 Education To Go. All rights reserved. The material on this site
cannot be reproduced or redistributed unless you have obtained prior written permission
from Education To Go. Education To Go and ed2go are registered trademarks of Education
To Go, a part of Cengage Learning.
                                                                                      hck-0

More Related Content

Similar to Advanced pc security final exam results

03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
AJS 524 Effective Communication/tutorialrank.com
 AJS 524 Effective Communication/tutorialrank.com AJS 524 Effective Communication/tutorialrank.com
AJS 524 Effective Communication/tutorialrank.comjonhson250
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric VanderburgEric Vanderburg
 
AJS 524 Enhance teaching - tutorialrank.com
AJS 524  Enhance teaching - tutorialrank.comAJS 524  Enhance teaching - tutorialrank.com
AJS 524 Enhance teaching - tutorialrank.comLeoTolstoy17
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat ForensicsIJSRD
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfjohn485745
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testersyasirabdullah15
 
Foot printing and Reconnaissance Techniques
Foot printing and Reconnaissance TechniquesFoot printing and Reconnaissance Techniques
Foot printing and Reconnaissance Techniquesyasirabdullah15
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
AJS 524 Expect Success/newtonhelp.com
AJS 524 Expect Success/newtonhelp.comAJS 524 Expect Success/newtonhelp.com
AJS 524 Expect Success/newtonhelp.commyblue18
 
Chapter 12 protection_mechanisms
Chapter 12 protection_mechanismsChapter 12 protection_mechanisms
Chapter 12 protection_mechanismshusseinalshomali
 

Similar to Advanced pc security final exam results (20)

Ch01
Ch01Ch01
Ch01
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
AJS 524 Effective Communication/tutorialrank.com
 AJS 524 Effective Communication/tutorialrank.com AJS 524 Effective Communication/tutorialrank.com
AJS 524 Effective Communication/tutorialrank.com
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
 
AJS 524 Enhance teaching - tutorialrank.com
AJS 524  Enhance teaching - tutorialrank.comAJS 524  Enhance teaching - tutorialrank.com
AJS 524 Enhance teaching - tutorialrank.com
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdf
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testers
 
Foot printing and Reconnaissance Techniques
Foot printing and Reconnaissance TechniquesFoot printing and Reconnaissance Techniques
Foot printing and Reconnaissance Techniques
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
AJS 524 Expect Success/newtonhelp.com
AJS 524 Expect Success/newtonhelp.comAJS 524 Expect Success/newtonhelp.com
AJS 524 Expect Success/newtonhelp.com
 
Chapter 12 protection_mechanisms
Chapter 12 protection_mechanismsChapter 12 protection_mechanisms
Chapter 12 protection_mechanisms
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativePeter Windle
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasGeoBlogs
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismDeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...Jisc
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxJisc
 

Recently uploaded (20)

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

Advanced pc security final exam results

  • 1. am Resources Lessons Quizzes Assignments Discussion Completion Log Out Advanced PC Security completion: final exam results d Final Exam Evaluation of your answers: 1. What term do you use to describe the hacking method where one participant is ethical and the other is unethical? You chose: Gray hat. Correct! Gray hat hacking is the term used when the person on the inside is ethical and the person on the outside is unethical. While both work together, the methods and the results are very questionable. 2. What do you call the three types of intrusions? You chose: Physical, remote, and system. Correct! These are the types of intrusions based on how hackers gain access to the network. 3. Under the U.S. Computer Fraud and Abuse Act, what is the penalty for illegal hacking? You chose: Fines, imprisonment, or both. Correct! Violation of the U.S. Computer Fraud and Abuse Act will result in fines, imprisonment, or both, depending upon the violation.
  • 2. 4. Which term describes an attack using emotions, trust, kindness, and friendship? You chose: A psychological social engineering attack. Correct! A psychological social engineering attack uses psychology to access the needed hacking information. 5. As an auditor, what is your primary concern about using social engineering methods in your audit? You chose: Ethics. Correct! The ethical consideration is not only what management may do with the information, but how your colleagues will feel about what you did. 6. What are the two simplest ways to secure a wireless network? You chose: Change the default username and password and disable the broadcast of your SSID. Correct! When you really want to secure your network, you need to follow these two steps carefully. 7. What are the names of the processes Google uses to index the Web and produce results? You chose: Gather, index, and query. Correct! The googlebot gathers the pages and links, feeds the document to the indexer for processing, and then uses the query to produce the results from several high-speed multi-processor computers. 8. What is a packet sniffer? You chose: A program that captures packets of traffic in and out of your computer. Correct! A packet sniffer or packet capture program captures traffic (through
  • 3. packets) in and out of your computer. (Lesson 3, Chapter 3) 9. How do you surf the Internet anonymously? You chose: Use a proxy server. Correct! When using a proxy server, the server downloads the pages and passes them to you, which guards your anonymity. 10. What kind of search is represented by the following: employee ANDpassword ORpasscode? You chose: A Boolean search. Correct! George Boole is the founding father of this popular search capability. 11. What can you use to find out if a network IP address is active? You chose: Network Query Tool. Correct! Through a series of network tests including a ping, tracert, and port check, the Network Query Tool will tell you if a network address is active and receiving traffic. 12. What types of searches can be done through registrars? You chose: IP, NIC, and Domain. Correct! You can search for owners of network domains by IP and domain (Web) addresses and nicknames. 13. What two layers operate within the Data Link Layer of the OSI model? You chose: Media Access Control (MAC) and Logical Link Control (LLC). Correct! In the Data Link Layer, MAC and LLC help with traffic control to
  • 4. ensure smooth data flow. 14. In the binary numbering system, which digit is an electrical off switch? You chose: 0. Correct! In the binary numbering system, 0 is the electrical off and the digit one is an electrical on switch. 15. Which term defines a set of methods and guidelines for computing? You chose: Protocol. Correct! Protocol, in its simplest definition, is a set of methods and guidelines that let computers talk to each other. 16. What type of packet is used to establish a network connection? You chose: SYN and ACK. Correct! These are the processes performed by TCP protocol to establish a network connection between two network devices. 17. What part of the packet allows a hacker to gather information and gain control? You chose: The IP header. Correct! The IP header contains all the information a hacker needs to collect network information and gain control by manipulating flags, forging IP addresses, and changing offset numbers in fragments. 18. What is the definition of spoofing? You chose: Forging a packet's source or destination IP address.
  • 5. Correct! Spoofing is a common way for hackers to gain access to your system. 19. Which of the following is an example of an exploit? You chose: A packet spoofing utility 20. Correct! They provide the ability to change the IP headers to anything the user wants. 21. What term defines unexpected behavior from a system or software using reasonable security policies? You chose: Universal vulnerability. Correct! A universal vulnerability is defined as unexpected behavior from a system or software using reasonable security policies. 22. What do you call a piece of programming code that does not handle excessive input of data? You chose: Unchecked buffer. Correct! An unchecked buffer is a piece of programming code that is used as a placeholder for programming values to be used in memory. 23. What is the name of the channels used to transfer data between input or output devices and the processor? You chose: Ports. Correct! Ports allow data to flow freely when they're open. 24. Which word defines a program that runs unattended in the background to perform continuous or periodic system-wide functions, such as network control?
  • 6. You chose: Daemon. Correct! This allows networks to run efficiently without needing human intervention. 25. What term describes scanning a network for ports and known services? You chose: Service discovery. Correct! When you perform a service discovery, you scan your network ports for known services like FTP and HTTP. 26. What do you call the icons, buttons, and graphics you use to execute computer commands? You chose: GUI. Correct! The icons, buttons, and graphics that provide user-friendly short cuts to your programs are called GUI. 27. What do you call the daemon that maintains a database and allows clients to find servers? You chose: Endpoint Mapper 28. Correct : The RPC endpoint mapper is a daemon that maintains a database called the local endpoint map, which allows clients to find servers 29. What provides the inner networking protocol that ties the client-server program together under RPC using TCP/IP? You chose: Stack. Incorrect. A stack is a layer of memory or networking protocol that provides access to the sockets. The correct answer is: DCOM. (Lesson 9, Chapter 4)
  • 7. 30. What is the main problem with public and private community strings? You chose: The authentication is weak. Correct! The authentication is weak because anyone can modify data, which means hackers can manipulate it at will. 31. Which type of rootkit is the most powerful? You chose: Kernel-mode. Correct! Kernel-mode rootkits are the most powerful since the native API can't intercept them and they directly manipulate the data structure. 32. What type of rootkit activates every time the system boots? You chose: Persistent. Correct! A persistent rootkit contains code that executes automatically when the system starts. 33. What are the duties of the security team? You chose: Policy development, practice, and response. Correct! The security team is the first responder whan a breach or other security incident occurs. 34. Which word defines data viewed by unauthorized personnel, data corruption, or data loss? You chose: Compromised. Correct! Compromised data that has questionable integrity. 35. Which best practice would prevent users from playing music CDs on their
  • 8. systems by imposing a penalty for doing so? You chose: A written reasonable use policy. Correct! This policy must detail forbidden actions and consequences to have full force. 36. Which term means the collection and analysis of data in a manner that is admissible in court? You chose: Computer forensics. Correct! CERT defines computer forensics as the collection and analysis of data from computer systems, networks, wireless, and storage media in a manner that is admissible in court. 37. What are records of regularly conducted activity called in court? You chose: Exception 38. Correct: Basically, they are records of regularly conducted activity. 39. Which of the following determines the admissibility of data in court? You chose: FRE. Correct! FRE determines the admissibility of computer data in court, and is a basic foundation for laws on computer crimes. Your score: 97 % (out of 100%). Good work. Final Exam Date submitted: 12/28/2011 05:16:28 AM (PST) Please print this evaluation for your records. resources | lessons | quizzes | assignments | discussion | completion Copyright © 1997 - 2011 Education To Go. All rights reserved. The material on this site
  • 9. cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning. hck-0