information security principles
answer the queations
Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers. * (0.5 Points) O A True O B. False 5 Unknown exploits have a confirmation of and measures can be taken against it to resolve them. (0.5 Points) O A True O B. False 6 The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is (0.5 Points) O A. Distributed Denial-of-Service (DDoS) O B. Denial-of-Service (DoS) O C. DDoS and Dos O D. Permanent Denial-of-Service (PDOS) E. Controlled Denial-of-Service (CDoS) 9 Which of the following is a non-technical type of intrusion or attack technique? (0.5 Points) A. Reverse Engineering B. Malware Analysis C. Social Engineering O D. Dumpster Diving E C and D 10 We use Cryptography term to transforming messages to make them secure and immune to: (0.5 Points) A. Attacks B. Tempering OC. Altering O D. All of the above O E A and B 13 Firewalls are often categorized as: * (0.5 Points) A. Packet Filters B. Network Firewalls O C. Host Based Firewalls O D. All of the above E B and c 14 ensures that sensitive information is kept away from those not authorized. (0.5 Points) O A Availability B. Confidentiality OC.Cryptography D. Integrity E All of the above 15 Which of the following is not true: * (0.5 Points) O A. The Publicly accessible centralized directory of digital certificates is known as Certificate Repository. O B. Protocol analyzer - Captures packets to decode and analyze their contents: facilitated by a router. O C. Message Digest is one-way hash algorithms that provides data confidentiality. O D. B and C E None of the above 17 Which action cannot be performed through a successful SQL injection attack? * (0.5 Points) O A. reformat the web application server's hard drive B. display a list of customer telephone numbers O C. discover the names of different fields in a table O D. erase a database table O E. None of the above 18 Which of the following information is not contained in digital certificate: * (0.5 Points) A. Owner's name or alias OB. Owner's public key C. Issuer's name O D. Issuer's Private key E. None of the above 19 What type of free downloaded software may include spyware? * (0.5 Points) O A. Electronic Games O B. Screensavers and toolbars O C. Anti-spyware software O D. All of the above O E. A and B 20 Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment? (0.5 Points) O A OS hardening 8. Application control C. Virtualization D. Sandboxing E B and D 21 What best describes phishing? (0.5 Points) A. It is the criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. B. It is a form of password attack by manipulating individuals into exposing confidential or personal information that may be used for fraudulent purposes. O C. It is the criminally fraudulent process of a keylogger attempting to capture keyboard keystrokes of the user, D. All of the above describes phishing very well. B and C 22 Which of them is not a major way of stealing email information? (0.5 Points) O A Stealing cookies O B. Reverse Engineering OC. Password Phishing O D. Social Engineering O E A and B 23 The antivirus or PC defender software in a system helps in detecting Virus and Trojans but not Ransomware (0.5 Points) A True B. Fake 26 Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment?* (0.5 Points) O A OS hardening OB. Application control O C. Virtualization O D. Sandboxing E. All of the above