DOC PREVIEW
EIU MBA 5670 - SummaryQuestions6

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

MBA 5670 Management of Information technologiesInformation Security & privacyReview QuestionsQ.1. An attacker is preparing an attack. He got the IP address of a potential target. Which of the following can he use in order to determine whether or not the potential target exist, is connected to the network, and is maybe responsive?a) Hit commandb) Ping messagesc) tracertd) None of the aboveQ.2. An attacker is preparing an attack. He got the IP address of a potential target. Which of the following could he use in order to know about the route that leads to the target?a) Hit commandb) Ping messagesc) tracertd) None of the aboveQ.3. Which of the following is considered social engineering? (Choose all that apply)a) Creating a network of people with knowledge in the engineering field.b) Misleading people to provide their personal information over the phonec) Misleading people to provide their the password for their user account over the phoned) Misleading people to provide their personal information through fake web sites e) None of the aboveQ.4. An attacker has used a single computer to send a stream of attack messages to a server to the point that the server began to operate very slowly. Which of the following does the attacker attempt?a) A malware attackb) A server attackc) A denial of service attackd) A ping-of-death attacke) None of the aboveQ.5. An attacker has sent a single oversized attack message to a server loaded with an old operating system. Upon receiving the oversized message, the server crashes. Which of the following does the attacker attempt? (Choose the best answer).a) A malware attackb) A server attackc) A denial of service attackd) A ping-of-death attacke) None of the above 1/3Q.6. Which of the following defines a (packet) firewall? (Choose all that apply)a) A network device designed to prevent or help extinguish fire in the server room.b) A security system that seats between a corporate network and another network like the Internet.c) A defense system that determine what kind of message is allowed to leave a networkd) A defense system that determine what kind of message is allowed to enter a networke) None of the aboveQ.7. Which of the following is considered content attack? (Choose all that apply)a) A stream of attack message that slow down a server computerb) An oversized attack message that makes a server computer crashc) Intentionally sending emails attachment that includes virusesd) Unsolicited commercial emailse) None of the aboveQ.8. A sort of malicious software that could spread across a network by itself is called…a) bugb) virusc) wormd) trojan horsee) None of the aboveQ.8. A sort of malicious software that disturbs the normal operation of a computer by infecting files on the target computer but cannot spread by itself is referred to as…a) a bugb) a virusc) a wormd) a trojan horsee) None of the aboveQ.9. A sort of malicious software that could allow an attacker to remotely take control of a computer system is referred to as…a) a bugb) a virusc) a wormd) a trojan horsee) None of the aboveQ.10. What is meant by an open mail server?a) A server configured to provide email serviceb) A misconfigured email server c) A server open for communication with any other serverd) None of the above 2/3Q.11. Which of the following can be used to protect a system against content attacks? (Choose all that apply)a) Trojan horsesb) Antivirus softwarec) Application firewalld) Intrusion detection systemse) None of the aboveQ.12. Which of the following is true about script kiddies?a) Script kiddies have more programming skills than hackersb) Script kiddies have more programming skills than crackersc) Script kiddies have less programming skills than hackers and crackersd) Script kiddies are Intrusion detection systemse) None of the above


View Full Document

EIU MBA 5670 - SummaryQuestions6

Download SummaryQuestions6
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view SummaryQuestions6 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view SummaryQuestions6 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?