Telecom Chapter 4 MMCQ
Telecom Chapter 4 MMCQ
Quiz-4 - QUIZ
1) The Target attackers probably first broke into Target using the credentials of a(n) .
A) low-level Target employee
B) Target IT employee
C) Target security employee
D) employee in a firm outside Target
4) Which of the following probably suffered the most financial damage from the Target breach?
A) Target
B) banks
C) consumers
D) retailers
5) Which of the following were able to recoup most of the money they lost from Target?
A) credit card companies
B) retailers
C) both A and B
D) neither A nor B
6) For consumers who suffered credit card fraud because of the Target breach and acted
quickly, which of the following is true?
A) They received no compensation.
B) They received compensation from Target.
C) The credit card companies did not charge them for fraudulent purchasers.
D) The United States Treasury compensated them from an insurance fund.
A) DoS
B) Hacking
C) Ransomware
D) Malware
13) Vulnerability-based attacks that occur before a patch is available are called
attacks.
A) indefensible
B) stealth
C) malware
D) zero-day
14) What kind of attack is most likely to succeed against a system with no
technological vulnerabilities?
A) malware
B) social engineering
C) both A and B
D) neither A nor B
A) an individual
B) a group
C) everyone
D) all of the above
19) Which of the following sometimes uses direct propagation between computers?
A) viruses
B) worms
C) Trojan horses
D) downloaders
23) Pieces of code that are executed after the virus or worm has spread are called .
A) vulnerabilities
B) exploits
C) compromises
D) payloads
24) In a attack, the attacker encrypts some or all of the victim's hard drive.
A) virus
B) DoS
C) ransom
D) lock
25) is the general name for malware on a user's PC that collects sensitive information
and sends this information to an attacker.
A) A keystroke logger
B) Anti-privacy software
C) Spyware
D) Data mining software
Answer: C
27) In which type of attack does the attacker gather extensive sensitive personal
information about its victim?
A) identity theft
B) credit card number theft
C) both A and B
D) neither A nor B
B) to intentionally use a computer on which you have an account but use it for
unauthorized purposes
C) both A and B
D) neither A nor B
31) If you see a username and password on a Post-It note that anyone can see on a monitor, is
it hacking if you use this information to log in?
A) yes
B) no
C) We cannot say from the information given.
32) You accidentally discover that you can get into other e-mail accounts after you have
logged in under your account and only spend a few minutes looking at another user's mail. Is
that hacking?
A) yes
B) no
C) We cannot say from the information given.
33) You click on a link expecting to go to a legitimate website but are directed to a website
that contains information you are not authorized to see. You exit without looking around. is
that hacking?
A) yes
B) no
C) We cannot say from the information given.
34) You are concerned with the security of a site you use and run a vulnerability test against
it. The test reveals a security threat. Is this hacking?
A) yes
B) no
C) We cannot say from the information given.
C) both A and B
D) neither A nor B
39) Which of the following can be upgraded after it is installed on a victim computer (choose
the most specific answer)?
A) Trojan horses
B) bots
C) viruses
D) worms
D) neither A nor B
48) In general, what should an employer do whenever an employee leaves the firm?
A) Their accounts should be disabled instantly
B) They should be given no prior notice that they are being released
C) both A and B
D) neither A nor B
52) Using encryption, you make it impossible for attackers to read your messages even if
they intercept them. This is .
lOMoARcPSD|11824774
A) authentication
B) confidentiality
C) both A and B
D) neither A nor B
63) In authentication, the is the party trying to prove his or her identity.
A) supplicant
B) verifier
C) true party
D) all of the above
73) Biometrics, and other new authentication methods, are being created with the goal of
getting rid of reusable passwords.
Answer: TRUE
78) In digital certificate authentication, the supplicant encrypts the challenge message with
.
A) the supplicant's private key
B) the verifier's private key
C) the true party's private key
D) none of the above
79) In digital certificate authentication, the verifier decrypts the challenge message with
.
A) the supplicant's private key
B) the true party's private key
C) the supplicant's public key
D) the true party's public key
80) In digital certificate authentication, the verifier gets the key it needs directly from the
.
A) supplicant
B) verifier
C) true party
D) certificate authority
82) Which form of authentication depends on the supplicant proving that she knows
something only the true party should know?
A) reusable password authentication
lOMoARcPSD|11824774
B) iris scanning
C) both A and B
D) neither A nor B
84) A debit card is secure because it requires two credentials for authentication–the card itself
and a PIN. This is called .
A) segmentation
B) redundancy
C) two-factor authentication
D) none of the above
89) When a packet that is part of an ongoing connection arrives at a stateful inspection
firewall, the firewall usually .
A) drops the packet
B) drops the packet and notifies an administrator
C) passes the packet
lOMoARcPSD|11824774
90) When a packet that is not part of an ongoing connection and that does not attempt to open
a connection arrives at a stateful inspection firewall, the firewall .
A) drops the packet
B) passes the packet
C) opens a new connection
D) does not approve the connection
91) How will a stateful packet inspection (SPI) firewall handle a packet containing a
TCP segment that contains an acknowledgement?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
93) is the dominant firewall filtering method used on main border firewalls today.
A) ACL filtering
B) Application content filtering
C) Stateful packet inspection
D) NGFW
94) In SPI firewalls, ACLs are used for packets in the state.
A) connection-opening
B) ongoing communication
C) both A and B
D) neither A nor B
95) In an SPI firewall, all rules except the last will permit the connection. The last will
.
A) also permit the connection
B) deny the connection
C) either A or B
D) none of the above
96) SPI firewalls are being replaced in large part because they are limited in their ability to detect
.
A) NAT
B) piggybacking
C) port spoofing
lOMoARcPSD|11824774
97) Which type of firewall filtering collects streams of packets to analyze them as a group?
A) SPI
B) NGFW
C) both A and B
D) neither A nor B
99) NGFWs .
A) can implement different rules for different applications
B) base server decisions on port numbers
C) both A and B
D) neither A nor B
101) If a packet is highly suspicious but not a provable attack packet, an may drop it.
A) SPI firewall
B) IDS
C) NGFW
D) none of the above