SlideShare a Scribd company logo
am
Resources        Lessons      Quizzes     Assignments            Discussion    Completion
                                                                                      Log Out
          Advanced PC Security

completion: final exam results
                                               d
Final Exam



Evaluation of your answers:



            1. What term do you use to describe the hacking method where one participant is
               ethical and the other is unethical?

               You chose: Gray hat.

               Correct! Gray hat hacking is the term used when the person on the inside is
               ethical and the person on the outside is unethical. While both work together, the
               methods and the results are very questionable.



            2. What do you call the three types of intrusions?

               You chose: Physical, remote, and system.

               Correct! These are the types of intrusions based on how hackers gain access to
               the network.



            3. Under the U.S. Computer Fraud and Abuse Act, what is the penalty for illegal
               hacking?

               You chose: Fines, imprisonment, or both.

               Correct! Violation of the U.S. Computer Fraud and Abuse Act will result in
               fines, imprisonment, or both, depending upon the violation.
4. Which term describes an attack using emotions, trust, kindness, and friendship?

   You chose: A psychological social engineering attack.

   Correct! A psychological social engineering attack uses psychology to access
   the needed hacking information.



5. As an auditor, what is your primary concern about using social engineering
   methods in your audit?

   You chose: Ethics.

   Correct! The ethical consideration is not only what management may do with
   the information, but how your colleagues will feel about what you did.



6. What are the two simplest ways to secure a wireless network?

   You chose: Change the default username and password and disable the
   broadcast of your SSID.

   Correct! When you really want to secure your network, you need to follow
   these two steps carefully.



7. What are the names of the processes Google uses to index the Web and produce
   results?

   You chose: Gather, index, and query.

   Correct! The googlebot gathers the pages and links, feeds the document to the
   indexer for processing, and then uses the query to produce the results from
   several high-speed multi-processor computers.



8. What is a packet sniffer?

   You chose: A program that captures packets of traffic in and out of your
   computer.

   Correct! A packet sniffer or packet capture program captures traffic (through
packets) in and out of your computer. (Lesson 3, Chapter 3)



9. How do you surf the Internet anonymously?

   You chose: Use a proxy server.

   Correct! When using a proxy server, the server downloads the pages and passes
   them to you, which guards your anonymity.



10. What kind of search is represented by the following: employee ANDpassword
    ORpasscode?

   You chose: A Boolean search.

   Correct! George Boole is the founding father of this popular search capability.



11. What can you use to find out if a network IP address is active?

   You chose: Network Query Tool.

   Correct! Through a series of network tests including a ping, tracert, and port
   check, the Network Query Tool will tell you if a network address is active and
   receiving traffic.



12. What types of searches can be done through registrars?

   You chose: IP, NIC, and Domain.

   Correct! You can search for owners of network domains by IP and domain
   (Web) addresses and nicknames.



13. What two layers operate within the Data Link Layer of the OSI model?

   You chose: Media Access Control (MAC) and Logical Link Control (LLC).

   Correct! In the Data Link Layer, MAC and LLC help with traffic control to
ensure smooth data flow.



14. In the binary numbering system, which digit is an electrical off switch?

   You chose: 0.

   Correct! In the binary numbering system, 0 is the electrical off and the digit
   one is an electrical on switch.



15. Which term defines a set of methods and guidelines for computing?

   You chose: Protocol.

   Correct! Protocol, in its simplest definition, is a set of methods and guidelines
   that let computers talk to each other.



16. What type of packet is used to establish a network connection?

   You chose: SYN and ACK.

   Correct! These are the processes performed by TCP protocol to establish a
   network connection between two network devices.



17. What part of the packet allows a hacker to gather information and gain control?

   You chose: The IP header.

   Correct! The IP header contains all the information a hacker needs to collect
   network information and gain control by manipulating flags, forging IP
   addresses, and changing offset numbers in fragments.



18. What is the definition of spoofing?

   You chose: Forging a packet's source or destination IP address.
Correct! Spoofing is a common way for hackers to gain access to your system.



19. Which of the following is an example of an exploit?

   You chose: A packet spoofing utility

       20. Correct! They provide the ability to change the IP headers to anything
           the user wants.



21. What term defines unexpected behavior from a system or software using
    reasonable security policies?

   You chose: Universal vulnerability.

   Correct! A universal vulnerability is defined as unexpected behavior from a
   system or software using reasonable security policies.



22. What do you call a piece of programming code that does not handle excessive
    input of data?

   You chose: Unchecked buffer.

   Correct! An unchecked buffer is a piece of programming code that is used as a
   placeholder for programming values to be used in memory.



23. What is the name of the channels used to transfer data between input or output
    devices and the processor?

   You chose: Ports.

   Correct! Ports allow data to flow freely when they're open.



24. Which word defines a program that runs unattended in the background to
    perform continuous or periodic system-wide functions, such as network
    control?
You chose: Daemon.

   Correct! This allows networks to run efficiently without needing human
   intervention.



25. What term describes scanning a network for ports and known services?

   You chose: Service discovery.

   Correct! When you perform a service discovery, you scan your network ports
   for known services like FTP and HTTP.



26. What do you call the icons, buttons, and graphics you use to execute computer
    commands?

   You chose: GUI.

   Correct! The icons, buttons, and graphics that provide user-friendly short cuts
   to your programs are called GUI.



27. What do you call the daemon that maintains a database and allows clients to
    find servers?

   You chose: Endpoint Mapper

       28. Correct : The RPC endpoint mapper is a daemon that maintains a database
           called the local endpoint map, which allows clients to find servers




29. What provides the inner networking protocol that ties the client-server program
    together under RPC using TCP/IP?

   You chose: Stack.

   Incorrect. A stack is a layer of memory or networking protocol that provides
   access to the sockets. The correct answer is: DCOM. (Lesson 9, Chapter 4)
30. What is the main problem with public and private community strings?

   You chose: The authentication is weak.

   Correct! The authentication is weak because anyone can modify data, which
   means hackers can manipulate it at will.



31. Which type of rootkit is the most powerful?

   You chose: Kernel-mode.

   Correct! Kernel-mode rootkits are the most powerful since the native API can't
   intercept them and they directly manipulate the data structure.



32. What type of rootkit activates every time the system boots?

   You chose: Persistent.

   Correct! A persistent rootkit contains code that executes automatically when
   the system starts.



33. What are the duties of the security team?

   You chose: Policy development, practice, and response.

   Correct! The security team is the first responder whan a breach or other
   security incident occurs.



34. Which word defines data viewed by unauthorized personnel, data corruption, or
    data loss?

   You chose: Compromised.

   Correct! Compromised data that has questionable integrity.



35. Which best practice would prevent users from playing music CDs on their
systems by imposing a penalty for doing so?

               You chose: A written reasonable use policy.

               Correct! This policy must detail forbidden actions and consequences to have
               full force.



           36. Which term means the collection and analysis of data in a manner that is
               admissible in court?

               You chose: Computer forensics.

               Correct! CERT defines computer forensics as the collection and analysis of
               data from computer systems, networks, wireless, and storage media in a manner
               that is admissible in court.



           37. What are records of regularly conducted activity called in court?

               You chose: Exception

                   38. Correct: Basically, they are records of regularly conducted activity.



           39. Which of the following determines the admissibility of data in court?

               You chose: FRE.

               Correct! FRE determines the admissibility of computer data in court, and is a
               basic foundation for laws on computer crimes.



Your score: 97 % (out of 100%). Good work.

Final Exam
Date submitted: 12/28/2011 05:16:28 AM (PST)

Please print this evaluation for your records.
                resources | lessons | quizzes | assignments | discussion | completion

 Copyright © 1997 - 2011 Education To Go. All rights reserved. The material on this site
cannot be reproduced or redistributed unless you have obtained prior written permission
from Education To Go. Education To Go and ed2go are registered trademarks of Education
To Go, a part of Cengage Learning.
                                                                                      hck-0

More Related Content

PDF
Final exam results
DOCX
Chapter 12.0
PPT
Shreya
DOCX
1)Which of the following are Penetration testing methodology
DOC
CIS 502 Life of the Mind/newtonhelp.com   
DOC
CIS 502 Imagine Your Future/newtonhelp.com   
DOC
CIS 502 Focus Dreams/newtonhelp.com
Final exam results
Chapter 12.0
Shreya
1)Which of the following are Penetration testing methodology
CIS 502 Life of the Mind/newtonhelp.com   
CIS 502 Imagine Your Future/newtonhelp.com   
CIS 502 Focus Dreams/newtonhelp.com

Similar to Advanced pc security final exam results (20)

DOCX
Introduction To Pc Security Pre Test.Doc
DOCX
Network security interview questions & answers
PDF
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
PDF
CMIT 321 QUIZ 3
DOCX
Cis 502 Extraordinary Success/newtonhelp.com
DOCX
1) Which of the following are Penetration testing methodology .docx
DOCX
CIS 502 Effective Communication/tutorialrank.com
PPTX
cyber quiz ppt presentation of engineering
PDF
CEHv8 practice Exam with key
DOCX
CIS 502 Education Redefined / snaptutorial.com
DOC
CIS 502 Education Specialist / snaptutorial.com
DOCX
CIS 502 Exceptional Education - snaptutorial.com
DOCX
Unit I Q&A.docx
PDF
CIS 333 Effective Communication - tutorialrank.com
PDF
Certified ethical hacker (cehv11) exam dumps 2022
DOC
Cis 502Enhance teaching / snaptutorial.com
ODT
Cmit 321 final exam new spring 2016
ODT
Cmit 321 final exam new spring 2016
ODT
Cmit 321 final exam new spring 2016
PDF
Cyber Security MCQ Questions and Answers
Introduction To Pc Security Pre Test.Doc
Network security interview questions & answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
CMIT 321 QUIZ 3
Cis 502 Extraordinary Success/newtonhelp.com
1) Which of the following are Penetration testing methodology .docx
CIS 502 Effective Communication/tutorialrank.com
cyber quiz ppt presentation of engineering
CEHv8 practice Exam with key
CIS 502 Education Redefined / snaptutorial.com
CIS 502 Education Specialist / snaptutorial.com
CIS 502 Exceptional Education - snaptutorial.com
Unit I Q&A.docx
CIS 333 Effective Communication - tutorialrank.com
Certified ethical hacker (cehv11) exam dumps 2022
Cis 502Enhance teaching / snaptutorial.com
Cmit 321 final exam new spring 2016
Cmit 321 final exam new spring 2016
Cmit 321 final exam new spring 2016
Cyber Security MCQ Questions and Answers
Ad

Recently uploaded (20)

PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Pre independence Education in Inndia.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
01-Introduction-to-Information-Management.pdf
PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Basic Mud Logging Guide for educational purpose
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
O7-L3 Supply Chain Operations - ICLT Program
Renaissance Architecture: A Journey from Faith to Humanism
Pre independence Education in Inndia.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
01-Introduction-to-Information-Management.pdf
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
102 student loan defaulters named and shamed – Is someone you know on the list?
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
human mycosis Human fungal infections are called human mycosis..pptx
Complications of Minimal Access Surgery at WLH
Basic Mud Logging Guide for educational purpose
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
O5-L3 Freight Transport Ops (International) V1.pdf
Ad

Advanced pc security final exam results

  • 1. am Resources Lessons Quizzes Assignments Discussion Completion Log Out Advanced PC Security completion: final exam results d Final Exam Evaluation of your answers: 1. What term do you use to describe the hacking method where one participant is ethical and the other is unethical? You chose: Gray hat. Correct! Gray hat hacking is the term used when the person on the inside is ethical and the person on the outside is unethical. While both work together, the methods and the results are very questionable. 2. What do you call the three types of intrusions? You chose: Physical, remote, and system. Correct! These are the types of intrusions based on how hackers gain access to the network. 3. Under the U.S. Computer Fraud and Abuse Act, what is the penalty for illegal hacking? You chose: Fines, imprisonment, or both. Correct! Violation of the U.S. Computer Fraud and Abuse Act will result in fines, imprisonment, or both, depending upon the violation.
  • 2. 4. Which term describes an attack using emotions, trust, kindness, and friendship? You chose: A psychological social engineering attack. Correct! A psychological social engineering attack uses psychology to access the needed hacking information. 5. As an auditor, what is your primary concern about using social engineering methods in your audit? You chose: Ethics. Correct! The ethical consideration is not only what management may do with the information, but how your colleagues will feel about what you did. 6. What are the two simplest ways to secure a wireless network? You chose: Change the default username and password and disable the broadcast of your SSID. Correct! When you really want to secure your network, you need to follow these two steps carefully. 7. What are the names of the processes Google uses to index the Web and produce results? You chose: Gather, index, and query. Correct! The googlebot gathers the pages and links, feeds the document to the indexer for processing, and then uses the query to produce the results from several high-speed multi-processor computers. 8. What is a packet sniffer? You chose: A program that captures packets of traffic in and out of your computer. Correct! A packet sniffer or packet capture program captures traffic (through
  • 3. packets) in and out of your computer. (Lesson 3, Chapter 3) 9. How do you surf the Internet anonymously? You chose: Use a proxy server. Correct! When using a proxy server, the server downloads the pages and passes them to you, which guards your anonymity. 10. What kind of search is represented by the following: employee ANDpassword ORpasscode? You chose: A Boolean search. Correct! George Boole is the founding father of this popular search capability. 11. What can you use to find out if a network IP address is active? You chose: Network Query Tool. Correct! Through a series of network tests including a ping, tracert, and port check, the Network Query Tool will tell you if a network address is active and receiving traffic. 12. What types of searches can be done through registrars? You chose: IP, NIC, and Domain. Correct! You can search for owners of network domains by IP and domain (Web) addresses and nicknames. 13. What two layers operate within the Data Link Layer of the OSI model? You chose: Media Access Control (MAC) and Logical Link Control (LLC). Correct! In the Data Link Layer, MAC and LLC help with traffic control to
  • 4. ensure smooth data flow. 14. In the binary numbering system, which digit is an electrical off switch? You chose: 0. Correct! In the binary numbering system, 0 is the electrical off and the digit one is an electrical on switch. 15. Which term defines a set of methods and guidelines for computing? You chose: Protocol. Correct! Protocol, in its simplest definition, is a set of methods and guidelines that let computers talk to each other. 16. What type of packet is used to establish a network connection? You chose: SYN and ACK. Correct! These are the processes performed by TCP protocol to establish a network connection between two network devices. 17. What part of the packet allows a hacker to gather information and gain control? You chose: The IP header. Correct! The IP header contains all the information a hacker needs to collect network information and gain control by manipulating flags, forging IP addresses, and changing offset numbers in fragments. 18. What is the definition of spoofing? You chose: Forging a packet's source or destination IP address.
  • 5. Correct! Spoofing is a common way for hackers to gain access to your system. 19. Which of the following is an example of an exploit? You chose: A packet spoofing utility 20. Correct! They provide the ability to change the IP headers to anything the user wants. 21. What term defines unexpected behavior from a system or software using reasonable security policies? You chose: Universal vulnerability. Correct! A universal vulnerability is defined as unexpected behavior from a system or software using reasonable security policies. 22. What do you call a piece of programming code that does not handle excessive input of data? You chose: Unchecked buffer. Correct! An unchecked buffer is a piece of programming code that is used as a placeholder for programming values to be used in memory. 23. What is the name of the channels used to transfer data between input or output devices and the processor? You chose: Ports. Correct! Ports allow data to flow freely when they're open. 24. Which word defines a program that runs unattended in the background to perform continuous or periodic system-wide functions, such as network control?
  • 6. You chose: Daemon. Correct! This allows networks to run efficiently without needing human intervention. 25. What term describes scanning a network for ports and known services? You chose: Service discovery. Correct! When you perform a service discovery, you scan your network ports for known services like FTP and HTTP. 26. What do you call the icons, buttons, and graphics you use to execute computer commands? You chose: GUI. Correct! The icons, buttons, and graphics that provide user-friendly short cuts to your programs are called GUI. 27. What do you call the daemon that maintains a database and allows clients to find servers? You chose: Endpoint Mapper 28. Correct : The RPC endpoint mapper is a daemon that maintains a database called the local endpoint map, which allows clients to find servers 29. What provides the inner networking protocol that ties the client-server program together under RPC using TCP/IP? You chose: Stack. Incorrect. A stack is a layer of memory or networking protocol that provides access to the sockets. The correct answer is: DCOM. (Lesson 9, Chapter 4)
  • 7. 30. What is the main problem with public and private community strings? You chose: The authentication is weak. Correct! The authentication is weak because anyone can modify data, which means hackers can manipulate it at will. 31. Which type of rootkit is the most powerful? You chose: Kernel-mode. Correct! Kernel-mode rootkits are the most powerful since the native API can't intercept them and they directly manipulate the data structure. 32. What type of rootkit activates every time the system boots? You chose: Persistent. Correct! A persistent rootkit contains code that executes automatically when the system starts. 33. What are the duties of the security team? You chose: Policy development, practice, and response. Correct! The security team is the first responder whan a breach or other security incident occurs. 34. Which word defines data viewed by unauthorized personnel, data corruption, or data loss? You chose: Compromised. Correct! Compromised data that has questionable integrity. 35. Which best practice would prevent users from playing music CDs on their
  • 8. systems by imposing a penalty for doing so? You chose: A written reasonable use policy. Correct! This policy must detail forbidden actions and consequences to have full force. 36. Which term means the collection and analysis of data in a manner that is admissible in court? You chose: Computer forensics. Correct! CERT defines computer forensics as the collection and analysis of data from computer systems, networks, wireless, and storage media in a manner that is admissible in court. 37. What are records of regularly conducted activity called in court? You chose: Exception 38. Correct: Basically, they are records of regularly conducted activity. 39. Which of the following determines the admissibility of data in court? You chose: FRE. Correct! FRE determines the admissibility of computer data in court, and is a basic foundation for laws on computer crimes. Your score: 97 % (out of 100%). Good work. Final Exam Date submitted: 12/28/2011 05:16:28 AM (PST) Please print this evaluation for your records. resources | lessons | quizzes | assignments | discussion | completion Copyright © 1997 - 2011 Education To Go. All rights reserved. The material on this site
  • 9. cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning. hck-0