SEC 280SEC280 Final Exam.docx
WEEK 8: FINAL EXAM
Question 14 pts
(TCO 5) SubSeven and Back Orifice are examples of which kind of malicious code?
Virus
Hoax
Worm
Trojan
Question 24 pts
(TCO 5) PGP uses _____ encr
...
SEC 280SEC280 Final Exam.docx
WEEK 8: FINAL EXAM
Question 14 pts
(TCO 5) SubSeven and Back Orifice are examples of which kind of malicious code?
Virus
Hoax
Worm
Trojan
Question 24 pts
(TCO 5) PGP uses _____ encryption.
symmetric
asymmetric
shared key
elliptical
Question 34 pts
(TCO 5) All of the following techniques help to secure IM communications EXCEPT which of
the following?
Running a corporate IM server
Using a different user name
Avoiding file transfers
Using encryption
Question 44 pts
(TCO 6) What is the name of the process that controls access to information based on the
sensitivity of that information and whether or not the user is operating at the appropriate
sensitivity level and has the authority to access that information?
MAC
DAC
RBAC
RBOC
Question 54 pts
(TCO 6) A file or resource owner has the ability to change the permissions on which file or
resource?
MAC
DAC
RBAC
RBOC
Question 64 pts
(TCO 6) Running Java applets from the Web on your system is considered _____.
a security risk
not risky
somewhat secure
very secure
Question 74 pts
(TCO 6) Common Gateway Interface (CGI) security issues include
poorly configured CGIs that can crash when users input unexpected data.
CGIs that can only be programmed in one insecure language.
CGIs that can only perform one process at a time, making it very susceptible to denial of service
attacks.
CGIs that will only work with Internet Explorer.
Question 84 pts
(TCO 6) Which is a 100% secure method to download applications from the Internet?
Signed applets
SSH
HTTPS
None of the above
Question 94 pts
(TCO 6) The protocol that provides a method for the transfer of files, both to and from a server,
is
Telnet.
SSH.
SNMP.
FTP.
Question 104 pts
(TCO 2) Installing unauthorized hardware such as a communication software and modem
is a common practice and does not affect the organization.
may cause a security breach and allow an intruder to have access to an organization's system by
opening up a backdoor.
boosts the system so downloading from the Internet will be faster.
saves the company from buying a license by using other software.
Question 114 pts
(TCO 2) All of the following are characteristics of a strong password EXCEPT which one?
Contains numbers and letters
Contains at least eight characters
Contains an uncommon dictionary word
Contains special characters (i.e., *%$#@)
Question 124 pts
(TCO 8) Which is the law that overhauled the financial accounting standards for publicly traded
firms in the United States?
Computer Fraud and Abuse Act
Stored Communications Act
CAN-SPAM Act
Sarbanes-Oxley Act
Question 134 pts
(TCO 4) Which of the following is not one of the three forms of trust models?
Hybrid
Star
Peer-to-peer
Hierarchical
Question 144 pts
(TCO 4) Which of the following reasons would be appropriate for a certificate suspension rather
than revocation?
All keys are compromised.
Changed affiliation.
An extended vacation.
[Show More]