McqMate
1. |
A vulnerability scanner is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» B. a tool used to quickly check computers on a network for known weaknesses. |
2. |
A packet sniffer is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
3. |
These hacker breaks security for altruistic or at least non-malicious reasons. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» A. White hat |
4. |
This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» B. Grey hat |
5. |
This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» C. Blue hat |
6. |
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs |
A. | Keylogger |
B. | Worm |
C. | Virus |
D. | Cracker |
Answer» A. Keylogger |
7. |
It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents. |
A. | Keylogger |
B. | Worm |
C. | Virus |
D. | Cracker |
Answer» C. Virus |
8. |
Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks. |
A. | Keylogger |
B. | Worm |
C. | Cracker |
D. | None of these |
Answer» B. Worm |
9. |
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called? |
A. | Trojan horses |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» A. Trojan horses |
10. |
These are program designed as to seem to being or be doing one thing, but actually being or doing another. |
A. | Trojan horses |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» A. Trojan horses |
11. |
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
A. | Rootkit |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» A. Rootkit |
12. |
Packet Sniffer is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» A. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
13. |
Rootkit is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
14. |
Spoofing attack is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
15. |
Security exploit is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» A. a prepared application that takes advantage of a known weakness. |
16. |
A spoofing attack is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
17. |
White hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» A. hacker breaks security for altruistic or at least non-malicious reasons. |
18. |
Grey hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
19. |
Blue hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
20. |
Black hat is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» A. someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
21. |
Script kiddie is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
22. |
Hacktivism is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» C. hacker who utilizes technology to announce a political message. |
23. |
It is a prepared application that takes advantage of a known weakness. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» A. security exploit |
24. |
It is a tool used to quickly check computers on a network for known weaknesses. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» B. vulnerability scanner |
25. |
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» C. packet sniffer |
26. |
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» A. security exploit |
Done Reading?