P.S: This is just a study guide. The questions may not appear exactly like this.
Question 2
(TCO 1) Why is the Morris Worm significant?
1. It placed embarrassing text on people’s screens.
2. This was the first large-scale attack on the Internet.
3. It was the very first virus on the Internet.
4. It attacked the Windows operating system.
Question 3
(TCO 1) Which of the following is not part of the information security triad?
1. Confidentiality
2. Integrity
3. Availability
4. Ethics
Question 4
(TCO 1) Examples of symmetrical encryption are
1. advanced encryption standard (AES).
2. data encryption standard (DES).
3. Rivest Code 4 (RC4).
4. All of the above
Question 5
(TCO 1) A ping sweep _____.
1. is a method of clearing a network
2. sends ICMP echo requests to the target machine
3. determines what services are running on a system
4. is an exploit that creates a denial of service (DoS) using ICMP echo requests
Question 6
(TCO 1) The message “Hacked by Chinese” was left by the _____.
1. Melissa virus
2. Love-Letter virus
3. Slammer Worm
4. Code Red Worm
Question 7
(TCO 1) Which of the following is considered sensitive information?
1. Medical records
2. Driver’s license number
3. Passport number
4. All of the above
Question 8
(TCO 1) When information is disclosed to individuals who are not authorized to see it, a _____ has been suffered.
1. loss of confidentiality
2. loss of integrity
3. loss of functionality
4. loss of availability
Question 9
(TCO 1) To ensure the privacy of a social security number during electronic communications, you want to _____ the data.
1. encrypt
2. hide
3. mask
4. not print
Question 10
(TCO 1) Advanced encryption standard (AES) is a(n) _____ algorithm.
1. masking
2. encryption
3. hashing
4. switching