You are on page 1of 104

CSCU

EXERCISE EXAM
 Test
 Test Number: 1-50
QUESTION 1
Smith receives a emai! "r#m his ba$
i"#rmi% him that it sus&ects a
uauth#ri'e( trasacti# # his acc#ut) T#
&r#tect his acc#ut* the emai! a(vises Smith
t# c!ic$ # a !i$ t# veri"+ his i(etit+ a(
&r#vi(e a+ missi% i"#rmati# i the "#rm)
Smith is a victim #":

A) ,ebsite (e"acemet a( (eia! #" service


) .hishi% attac$)
C) C+berterr#rism
QUESTION 1
Smith receives a emai! "r#m his ba$
i"#rmi% him that it sus&ects a
uauth#ri'e( trasacti# # his acc#ut) T#
&r#tect his acc#ut* the emai! a(vises Smith
t# c!ic$ # a !i$ t# veri"+ his i(etit+ a(
&r#vi(e a+ missi% i"#rmati# i the "#rm)
Smith is a victim #":

A) ,ebsite (e"acemet a( (eia! #" service


) .hishi% attac$)
C) C+berterr#rism
QUESTION 
Ste!!a ee(s t# bu+ a %i"t "#r her "rie( # her
birth(a+)
birth(a+) ,hi!e sh#&&i%
sh#& &i% #!ie* a messa%e "r#m
" r#m the
Iteret Service .r#vi(er
.r#vi(er IS.2 &#&s-u&* 3hich ur%es
Ste!!a t# c!ic$ # the !i$ t# veri"+ #r u&(ate her
acc#ut i"#rmati#) I(eti"+ the t+&e #" s#cia!
e%ieeri% attac$4

A) C#m&uter-ase(
C#m&uter-ase( S#cia! E%ieeri%)
) 6uma-ase( S#cia! E%ieeri%
C) S#cia! E%ieeri% Usi% SMS
/) S&am Emai!
QUESTION 7
C+ber crimia!s ca use +#ur c#m&uter t# stea! &ers#a!
a( #ther im&#rtat i"#rmati# "r#m +#u #r (# s#me
mischiev#us activities) 8#h 3hi!e sur9% the Iteret %ets
a &#&-u& a( a( it ta$es
ta$es 8#h t# a 3ebsite that #ers a
"ree %ame "#r his c#m&uter) ,hat is the best c#urse acti#
"#r 8#h4
A) /#3!#a( the %ame #3* a( (eci(e !ater 3hether t#
ista!! # his .C #r %ive the %ame t# his "rie(
) /#3!#a( the %ame* ista!! it* as 8#h ca uista!! the
%ame a+time i" there is a+ &r#b!em
C) Research ab#ut the %ame # the Iteret a( chec$
3hether it is sa"e t# (#3!#a( it #r #t)
/) Chec$ 3hether the 3ebsite is as$i% "#r a+ m#e+) I" it
is "ree* sim&!+ (#3!#a( the %ame
QUESTION ;
Social networking websites such as Facebook and Twitter
Twitter allow
users to create their own personal webpages and connect with
their relatives and friends. Creating webpages on social networking
sites is fun and exciting. What if, while creating a website, the user
is not careful enough which can pave way for hackers and other
malicious users !lisha also created her own webpage on
Facebook. She got a message on her wall saying "#ey !lisha, its
ur uncle Tom$
Tom$ Thanks for the invitation % &unt 'ichel is f( and we
both )ove ur webpage. Wed love to *oin ur friend list$" What does
!lisha have to do now
A) Acce&t the re<uest
) /e+ the re<uest)
C) Acce&t but %ive access t# !ess i"#rmati#
/) /e!ete the 3eb&a%e
QUESTION 5
+t can be convenient to access email and surf the +nternet using a
wireless computer. #owever, wireless networks can be vulnerable to
hackers unless the user takes necessary precautions. onald wants to
make an insurance policy and buy some stock online using his wireless
computer. While investing, the agency re-uires onald to prove his
identity and provide a security token. sing a security token when
investing online allows /ohn to

A) =#% #t# a &ub!ic c#m&uter "#r a &re(etermie( am#ut #"


time
) Carr+ his !a&t#& sa"e!+ #verseas i a c#mmercia! air&!ae
C) >eerate ra(#m &ass-c#(es t# access his #!ie 9acia!
acc#uts 3ith a((e( securit+)
/) 6e(%e his ivestmet b+ m#vi% a &#rti# #" his ivestmet
it# U)S) Securities
QUESTION ?
.ame!a uses Iteret t# chat 3ith her "rie(s* 3#r$
# #@cia! (#cumets* a( ba$ #!ie) She #"te
%ets c#"use( a( c#u!( #t trust the 3ebsites
that she is br#3si% 3he tras"erri% m#e+ t#
her (au%hter) 6#3 ca she esure that the (ata
set bet3ee her c#m&uter a( the ba$i%
3ebsite is ecr+&te(4 Se!ect a!! that a&&!+2
A) + chec$i% the 3ebsite !i$)
) + rea(i% the terms a( c#(iti#s
C) + rea(i% the &rivac+ &#!icies
/)  Ti+ &a(!#c$ ic# "#u( at the b#tt#m #" a ,eb
site
QUESTION 
)inda banks online to pay her utilities bills, shop,
etc. Which of the following are application%level
encryption protocols that )inda would most likely
use to bank online safely

 &. SS) and S!T.


0. 1erisign and S#&2
C. !&34, S!T, and 56
3. 757, 7!', and SS)
QUESTION B
 8e 3ats t# sh#& #!ie but is c#cere(
ab#ut a c#m&a+ &rivac+ &#!ic+) ,hat
#!ie &urchase (ecisi# ai( sh#u!( he use4

A) Sh#&b#t
)  Trust veri9cati# site)
C) usiess rati% site
/) Sh#&&i% &#rta!s
QUESTION 
+ want to re-uest secure web pages using https899.
What port will + need to open on my firewall to
allow these SS)%encrypted packets to flow
 &. ::
0. ;<
C. =>
3. ??<.
QUESTION 10
Susan spends most of the time on computer working
and doing other things. Susan left her 7C connected to
+nternet idle for some time. &n attacker, although was
not able to steal any information, remotely utili@ed her
7CAs processor cycles for some of his computationally
intensive task. Classify the above breach of security

 &. 3isclosure of information


0. Compromising integrity of the 7C.
C. 3enial of service attack
3. 0uffer overflow attack
QUESTION 11
&nne suspects that her husband is cheating on her. #e
spends most of his time on the +nternet chatting with a woman.
When -uestioned, he says she is a good friend and a
colleague. 6n suspicion, &nne contacted her friend who
happened to be a network security administrator. pon his
instructions, &nne installed a Beylogger when her husband
was away for work. #ow does a Beylogger can help &nne to
know whether her husband is cheating or not
 &. +t captures the voice communication of her husband
0. Captures the control panel settings
C. Captures the .pdf 73F%7rintable 3ocument FormatD files
and sends them to her as attachments
3. Captures all the keystrokes that her husband types.
QUESTION 1
Company &0C has various departments that
have developed several private resources that
can be accessed using +nternet protocols. The
company &0C now wants to link these resources
together. What type of network is being described
here
 &. +nternet
0. !xtranet
C. +ntranet.
3. 1irtual private network
QUESTION 17
Nac+ 3ats t# sa"e%uar( herse!" a(
&revet her i(etit+ "r#m bei% st#!e) ,hat
3#u!( +#u rec#mme( her t# (# be"#re
thr#3i% a3a+ items 3ith &ers#a!
i"#rmati# # them4

A) ,rite (#3 the i"#rmati# "#r the rec#r(s


) Shre( them #r tear them u&)
C) N#t ecessar+ t# (# a+thi%
/) C#tact the 9acia! istituti# a( veri"+
her trasacti#s
QUESTION 1;
A!!e* a "r#t #@ce eDecutive "r#m At!ata* has
ever ta$e a bac$u& #" his s+stem) 6e is
3#rrie( ab#ut securit+ #" the (ata i case his
s+stem crashes) ,hich #" the "#!!#3i% t+&e #"
bac$u& 3i!! +#u su%%est t# A!!e i" he 3ats t#
ta$e a c#m&!ete bac$u& #" his s+stem4

A) N#rma! /ata ac$u&)


) Icremeta! /ata ac$u&s
C) /ieretia! /ata ac$u&
/) u!! Icremeta! /ata ac$u&s
QUESTION 15
Shar# recet!+ &urchase( a e3 smart &h#e "#r
herse!") ,hi!e eD&!#ri% her &h#e* she trie( t# set
her m#bi!e &h#eFs !uet##th securit+) Shar#
3ats her &h#eFs !uet##th t# be i (e"au!t
#&erati# m#(e) ,hich am#% the "#!!#3i%
#&ti#s Shar# has t# se!ect t# $ee& her m#bi!e i
!uet##thFs (e"au!t securit+ m#(e4

A) N#-secure m#(e)
) =eavi% securit+ u& t# each a&&!icati#
C) E"#rce !i$ ecr+&ti# "#r a!! tra@c
/) Securit+ setti%s (e"au!t t# a m#bi!e &#!ic+ server
QUESTION 1?
 &ustin and Stuart are two brothers. &ustin works for a reputed +T
firm and sometimes his *ob re-uires him to work from home
with his 7C connected to the +nternet. When &ustin is away to
work, his brother Stuart uses his 7C. &ustin suspected that his
brother browses +nternet fre-uently and watches porn on his
7C. &ustin wants to -uietly and automatically block all the porn
websites so that his brother does not visit them. What must
 &ustin do in order to block the porn websites automatically
 &. +nstall scanning tool to scan the system
0. +nstall a firewall that blocks all porn
C. +nstall an antivirus software and activate parental control.
3. +nstall a keylogger
QUESTION 1
Nic$ receive( a emai! &r#m#ti# stati% that
he has 3# a e3 car) The emai! as$s him t#
(e&#sit G;0 t# the se(erFs acc#ut a(
&r#vi(e s#me cre(etia!s) ,hat 3i!! be the
best c#urse #" acti# "#r Nic$ i this situati#4

A) >ive #!+ his s#cia! securit+ umber a(


am#ut
) Sim&!+ (e!ete the emai!)
C) Sca the emai!
/) #r3ar( the mai! t# I "#r ivesti%ati#
QUESTION 1B
Sa(ra s&e(s m#st #" the &#st-#@ce h#urs chatti% t# her
"rie(s # aceb##$) Recet!+ she came t# $#3 re%ar(i%
a %r#u& # aceb##$ - ab+sitter >#es t# 8ai! a"ter she
U&!#a(s This 6ORRI=E ab+ .h#t# O!ie) /ue t#
curi#sit+* she H#ie( the %r#u& t# $#3 m#re ab#ut it) The
"aci!itat#r #" this %r#u& has re<ueste( a!! its members t#
raise "u(s "#r the i#cet babies 3h# are bec#mi% the
victims #" bruta! harassmet) ,hat 3i!! +#u rec#mme(
Sa(ra* 3hether t# H#i the %r#u& #r i%#re it4

A) Quit the aceb##$ %r#u&* it ma+ be a scam)


) Raise "u(s "#r the babies
C)  8ust "aci!itate the %r#u&
/) isit the %r#u& re%u!ar!+
QUESTION 1
Emma &urchase( a e3 c#m&uter rui% ,i(#3s 
#&erati% s+stem* 3ith s#me re!ative!+ recet s#"t3are
ista!!e() Emma 3ats t# (isab!e s#me u3ate(
services that are rui% # her c#m&uter) 6#3 (#es
she (isab!e services s# that she ca (isab!e the
uecessar+ &r#%rams4

A) Start -J t+&e Kservices)mscK i search b#D a( &ress


ENTER t# #&e the Services 3i(#3)
) Start -J A!! .r#%rams -J A(miistrative T##!s -J
Services
C) Start -J C#tr#! .ae! -J Services
/) Start -J A!! .r#%rams -J Services
QUESTION 0
Emers# 3#r$s "#r a re&ute( 9ace c#r&) a( has t#
trave! "re<uet!+ t# &!aces) 6is !a&t#& h#!(s critica!
9acia! i"#rmati# re!ate( t# his c!iets a( #ther
busiess (ea!s) =a&t#& the"t ma+ !ea( t# the (isc!#sure
#" i"#rmati# such as c!iet ames* c#9(etia! (ata*
a( #ther 9acia! (etai!s re!ate( t# the c#r&#rate #r
Iteret evir#met) ,hich #" the "#!!#3i% is
rec#mme(e( i #r(er t# &r#tect his !a&t#& "r#m the"t4

A) Ecr+&t a!! the (ata i !a&t#&


) Never !eave the !a&t#& uatte(e()
C) Eab!e >.S trac$i% i !a&t#&
/) .ass3#r( &r#tect the !#%i
QUESTION 1
M#st #" the stu(ets t#(a+ s&e( their time # the Iteret)
 The+ share 3ebsites 3ith each #ther usi% the chat r##ms as
users) S#me #" the i#cet $i(s ma+ "a!! &re+ a( visit
ma!ici#us !i$s set t# them that mi%ht either be a $i( #"
tric$ t# %et their &ers#a! i"#rmati# #r #&e a 3eb &a%e that
is #t secure) ,hich #" the "#!!#3i% are the securit+ ti&s +#u
ee( t# "#!!#3 t# esure that +#u (#Ft "a!! tra& "#r IM attac$s4

A) Save a( #&e a+ (#cumets that +#u acce&t "r#m +#ur IM
c#tacts
) /# #t c!ic$ # the !i$s set b+ u$#3 members i the
chat r##m)
C)  L#u ee( t# use +#ur &ers#a! emai! I/ t# re%ister t# !i$s
that are set thr#u%h IM
/) /# #t #&e 9!es 3ith the eDtesi# etc)
QUESTION 
 ,hich am#% the "#!!#3i% eD&!#its
&e#&!eFs te(ec+ t# se!ect 3ea$
&ass3#r(s a( uses a !ist #" &re-(e9e(
3#r(s t# (isc#ver the c#rrect &ass3#r(s4
A) >uessi%
) rute #rci%
C) /icti#ar+ Attac$)
/) Sh#u!(er Sur9%
QUESTION 7
,hich #" the "#!!#3i% &ass3#r( 3i!! be the
str#%est4

A) <3ert+
) a(miistrat#r
C) Q5?ra>)
/) m+&ass3#r(
QUESTION ;
,hat is the &r#cess #" ec#(i% i"#rmati#
i a 3a+ s# that #!+ s#me#e 3ith a $e+
ca (ec#(e it4

A) C#m&ressi#
) Ste%a#%ra&h+
C) S+stemic variati#
/) Ecr+&ti#)
QUESTION 5
 8#h use( a t##! t# create a ecr+&te( va!ue
simi!ar t#
Kb?7Beee"70?(0e?"ae(e;?aK
re&reseti% a im&#rtat 9!e) 6is et3#r$
a(miistrat#r t#!( him that this va!ue 3i!! be
(ieret ever+ time there is a cha%e i the 9!e)
,hat is 8#h %eerati% i #r(er t# chec$ the
ite%rit+ #" the 9!e4
A) Ecr+&ti# a!%#rithm
) 6ash va!ue)
C) Ecr+&ti# va!ue
/) /ecr+&ti# va!ue
QUESTION ?
The screen below appears while you are browsing the +nternet. What is the
most appropriate action you will take to keep your system secure

 &. 4ou have an out of date browser, as indicated by the message. 4ou
will click 7rotect 7C Eow button.
0. 4ou have an out of date browser, as indicated by the message. 4ou
will click pdates button in the left pane.
C. This is probably a malware attack. 4ou will close the screen by
clicking Close D option at the right%top corner of the screen.
QUESTION 
#b 3ats t# se( a sh#rt c#9(etia!
messa%e t# Smith* usi% &ub!ic $e+
cr+&t#%ra&h+) 6#3 sh#u!( #b achieve
that4
A) #b sh#u!( ecr+&t it 3ith his &rivate $e+
) #b sh#u!( ecr+&t it 3ith his &ub!ic $e+
C) #b sh#u!( ecr+&t it 3ith SmithFs &rivate
$e+
/) #b sh#u!( ecr+&t it 3ith Smiths &ub!ic
$e+)
QUESTION B
,hich #" the "#!!#3i% s#"t3are &r#%rams
3#u!( eab!e a attac$er t# have a
c#m&!ete c#tr#! #ver a victimFs c#m&uter4

A) irus
) ,#rm
C)  Tr#Ha)
/) Pe+!#%%er
QUESTION 
Na(a!* the i(ustria!ist "r#m N#r3a+* 3as trave!!i%
"r#m his h#met#3 t# urich "#r busiess
&ur&#se) O the 3a+ his &h#e 3as st#!e b+ a
bur%!ar) ,hich c#(e Na(a! ma+ use t# (eactivate
his &h#e i #r(er t# save his &ers#a! as 3e!! as
c#9(etia! busiess i"#rmati# st#re( i his
&h#e4

A) IMEI c#(e)
) IEMI c#(e
C) 0
/) 0
QUESTION 70
I" +#u ever receive a us#!icite( te!e&h#e
ca!! "r#m s#me#e c!aimi% t# ee( +#ur
&ass3#r(* 3hat 3#u!( +#u (#4

A) Re"use a( re&#rt imme(iate!+)


) ,rite the &ass3#r( # a &iece #" &a&er*
&ut it i a eve!#&e a( se( it b+ mai!
C)  Te!! himher the &ass3#r( a( cha%e it
the "#!!#3i% (a+
/) Se( himher the &ass3#r( via emai!
QUESTION 71
 8as# is s$e&tica! #" the securit+ #" his Iteret c#ecti#) 6e sus&ects
that his s+stem is i"ecte( 3ith s#me Tr#Ha 3hich c#ects t# a rem#te
attac$er a( se(s sesitive (ata) O rec#mme(ati# #" #e #" his
"rie( 3h# is a et3#r$ a(miistrat#r* 8as# rus a ,i(#3s c#mma(
t# 9( #&e &#rts* services* a( a&&!icati#s ass#ciate( 3ith these
services) O rui% the c#mma( "r#m the c#mma( &r#m&t* 8as#
%ets "#!!#3i% scree:

,hich c#mma( is 8as# rui%4


A) etstat a
) etstat b)
QUESTION 7
,hich #" the "#!!#3i% attac$ uses a hi%h!+
(irecti#a! atea a( a !a&t#& t#
estab!ish c#ecti#s 3ith !uet##th-
eab!e( (evices "r#m #ver a ha!"-mi!e
a3a+4
A) !uesi&i%)
) !ueHac$i%
C) u''i% attac$
/) !uesar9%
QUESTION 77
 The N#rth Car#!ia base( hea!thcare c#m&a+
st#re( me(ica! (ata #" cust#mers 3ith#ut
im&!emeti% &r#&er i"#rmati# securit+ c#tr#!s
3hich !e( t# the (isc!#sure #" me(ica! rec#r(s #"
hu(re(s #" its cust#mers) ,hich #" the "#!!#3i%
act ca be iv#$e( a%aist the c#m&a+4

A) 6I.AA)
) ER.A
C) .CI /SS
/) AA.IE
QUESTION 7;
The following diagram shows a network device that is used for
connecting the modem to the network and determining the next network
point to which a packet should be forwarded. This device can access the
address of a network layer and can have incorporated software that
helps it identify the possible paths between the addresses and the
appropriate channels to transmit data.

I(eti"+ the (evice)

A) 6ub
 NICs
QUESTION 75
 The a(vace( ecr+&ti# sta(ar( AES2 is
a iterate( s+mmetric b!#c$ ci&her (e9e( i
I.S* 3hich meas that it 3#r$s b+ re&eati%
the same (e9e( ste&s mu!ti&!e times) ,hat
$e+ !e%th (#es AES #t su&&#rt4

A) 1B-bit
) 51-bit)
C) 5?-bit
/) 1-bit
QUESTION 7?
 L#ur I. a((ress ca !i$ +#ur Iteret activities
(irect!+ t# +#uV it ca be use( t# 9( +#ur ame
a( !#cati#) S# &r#tecti% +#ur O!ie I(etit+ is a
must* thus A#+m#us ,eb Sur9% a( the abi!it+
t# hi(e +#ur I. a((ress are ma(at#r+ i #r(er t#
esure a hi%h !eve! #" #!ie &r#tecti#) ,hich #"
the "#!!#3i% is a I. A((ress 6i(i% T##!4

A)  TOR)
) 6i(er I.
C) A#+m#us Use
/) M+ I.
QUESTION 7
,hich #" the "#!!#3i% 3i!! he!& &revet
uautheticate( access t# the 3ire!ess
et3#r$4

A) 6TT. a( .N


) .N a( I&sec)
C) 6TT. a( ,E.
/) I.sec a( 6TT.
QUESTION 7B
,hat (#es a user (# i" he (#es #t 3at
ever+#e # the et3#r$ t# access his share(
(is$ #r "#!(er4
A) Create a hi((e share b+ a((i% a &erceta%e
si% W2 t# the e( #" the share ame
) Create a hi((e share b+ a((i% a (#!!ar si%
G2 t# the start #" the share ame
C) Create a hi((e share b+ a((i% a (#!!ar si%
G2 t# the e( #" the share ame)
/) Create a hi((e share b+ a((i% a &erceta%e
si% W2 t# the start #" the share ame
QUESTION 7
Secure S#c$ets =a+er SS=2 is the sta(ar( securit+
tech#!#%+ use( t# create a secure c#mmuicati#
chae! bet3ee a server a( a c!iet) SS= isures
that:

A) A!! i"#rmati# trasmitte( bet3ee the 3eb server


a( the br#3ser is set via a thir( &art+ service
&r#vi(er
) A!! i"#rmati# trasmitte( bet3ee the 3eb server
a( the br#3ser is ecr+&te()
C) A!! i"#rmati# trasmitte( bet3ee the 3eb server
a( the br#3ser is veri9e( b+ a certi9cate auth#rit+
/) #th   C
QUESTION ;0
 8as# ca!!s a c#m&a+Fs he!& (es$ a( sa+s he
has "#r%#tte his &ass3#r() 6e a((s that i" he
misses the (ea(!ie # a bi% a(vertisi%
&r#Hect* his b#ss mi%ht 9re him) ,hat eDact!+
is 8as# tr+i% t# (#4

A) Ma$e "rie(s 3ith the he!& (es$ eDecutive


) Usi% s#cia! e%ieeri% t# eDtract
i"#rmati# "r#m the he!& (es$ eDecutive)
C)  Tr+i% t# hac$ the &ass3#r(
/)  Tr+i% t# create a s#cia! et3#r$
 QUESTION ;1
+dentify the authorities represented by &, 0, and C in a
digital certificate setup as depicted in following diagram8

A) A - Re%istrati# Auth#rit+ RA2*  - a!i(ati# Auth#rit+ A2* C - Certi9cate Auth#rit+ CA2


) A - Certi9cate Auth#rit+ CA2*  - Re%istrati# Auth#rit+ RA2* C - a!i(ati# Auth#rit+ A2
C) A - Re%istrati# Auth#rit+ RA2*  - Certi9cate Auth#rit+ CA2* C - a!i(ati# Auth#rit+ A2)
/) A - Certi9cate Auth#rit+ CA2*  - a!i(ati# Auth#rit+ A2* C - Re%istrati# Auth#rit+ RA2
QUESTION ;
 The "#!!#3i% (ia%ram i!!ustrates h#3 a 9!e #r
"#!(er ca be ecr+&te( i a ,i(#3s  s+stem)

,hich ative ecr+&ti# s+stem ,i(#3s  uses t#


secure 9!es4
A) A(vace( Ecr+&ti# S+stem AES2
) Ecr+&te( i!e S+stem ES2)
QUESTION ;7
8#h* 3hi!e sur9% the 3eb "#r basic c#m&uter
securit+ measures* !eart that a!! the (is$ (rives
sh#u!( be "#rmatte( 3ith the NTS 9!e s+stem) 6e
chec$e( his s+stem a( (isc#vere( that his /:
(rive is "#rmatte( 3ith the AT 9!e s+stem) ,hich
#" the "#!!#3i% c#mma( 8#h ca use t# c#vert
the (rive "r#m AT t# NTS i a ,i(#3s s+stem4

A) c#vert /: c#vert "at t"s


) c#vert /: "s:t"s)
C) c#vert /: "s:"at t"s
/) c#vert /: "s:t"s "at
QUESTION ;;
#b h#!(s a cre(it car( "r#m a re&ute( ba$) 6e
use( the car( t# &urchase %##(s at
htt&s:ama'#)c#m* but 3he the ba$
statemet 3as issue(* he ca!!e( the ba$ a(
c!aime( that he ever auth#ri'e( the
trasacti#) Cate%#ri'e this "rau(4

A) Cre(it car( mai! #r(er "rau(


) S$immi%c#uter"eit cre(it car(
C) Char%ebac$ "rau()
/) Car(-#t-&reset CN.2 "rau(
QUESTION ;5
S#me #" the c#mm# threats t# 3ire!ess et3#r$s
ic!u(e eaves(r#&&i%* (ata iterce&ti# a(
m#(i9cati#* (eia!-#"-service* s&##9%* etc) ,hich
#e #" the "#!!#3i% seteces (escribes s&##9%4
A) A attac$er mas<uera(i% as a !a3 e"#rcemet
auth#rit+ t# %ai access t# the 3ire!ess et3#r$
) A attac$er usi% t##!s t# 9( 3ire!ess access
&#its 3here the+ ca &ic$ u& a SSI/ br#a(cast
C) It is a i!!e%itimate techi<ue #" %aii% access b+
mas<uera(i% as a !e%itimate user)
/) /) A attac$er shutti% (#3 the access &#its b+
 Hammi% the ra(i# 3aves
QUESTION ;?
,hich #" the "#!!#3i% is true c#si(eri% E-mai!
threats4
A) .hishi% mai!s !ure victims t# &r#vi(e &ers#a! (ata)
) I h#aD mai!* the user ma+ receive s&am mai!s that
c#tai ma!3are* a!!#3i% attac$ers t# ta$e c#tr#!
#" the users c#m&uter
C) I s&ammi%* the user ma+ receive threatei%
emai!s that c#tai "a!se i"#rmati#* isisti% that
he #r she "#r3ar(s the emai!
/) 6#aD mai! c#tais attachmets that ma+ c#tai a
virus* tr#Ha* 3#rm* $e+!#%%ers* a( m#reV #&ei%
such attachmets i"ects the c#m&uter
QUESTION ;
R#bi "re<uet!+ uses his cre(it car(s t# sh#& #!ie)
6e 3as sh#c$e( !##$i% at his recet cre(it car(
statemet as he (isc#vere( s#me etries "#r items
that he ever &urchase() O chec$i% 3ith the #!ie
sh#&* he 3as t#!( that the+ have #t (#e it a( it
mi%ht have cre&t i (ue t# s#me securit+ &r#b!ems i
cre(it car( &r#cessi%) ,hich #" the "#!!#3i%
sta(ar(s 3i!! he!& R#bi t# res#!ve this issue4
A) 6I.AA
) EMA
C) .CI /SS)
/) ER.A
QUESTION ;B
,hich #" the "#!!#3i% attac$ iv#!ves
a#+m#us!+ se(i% a e!ectr#ic
busiess car( #r &h#t# t# a#ther
!uet##th user4

A) !uesi&i%
) !ueHac$i%)
C) u''i% attac$
/) !uesar9%
QUESTION ;
htt&:333)eD&eria)c#m*
htt&:333)e<ui"aD)c#m* a(
htt&:333)trasui#)c#m are eDam&!es #"
cre(it re&#rti% a%ecies) L#u sh#u!( c#tact
these a%ecies i" sus&ect that +#ur i(etit+ is
st#!e) These a%ecies 3i!! he!& +#u i:

A) Ivesti%ati% 3h# has st#!e the i(etit+


) Rec#veri% +#ur !#ss #ut #" i(etit+ the"t
C) .r#tecti% "r#m !#sses (ue t# i(etit+ the"t)
/) Creati% a e3 i(etit+ "#r +#u
QUESTION 50
A attac$ that is ite(e( t# severe!+ !imit
access t# et3#r$ res#urces* Iteret* #r
#ther services is c#mm#!+ re"erre( t# as:
A) .hishi%
) S&##9%
C) /eia! #" service)
/) uer #verY#3

You might also like