Preview

10 - Practice Test

 1. An example of social engineering is the use of a trojan horse.

  FALSE

  TRUE

 2. Malware distribution is legal in most countries and helpful in preventing security breaches.

  FALSE

  TRUE

 3. Viruses are engineered pieces of code that cause great destruction. They do not need to attach themselves to a program unlike worms.

  FALSE

  TRUE

 4. Worms are a type of social engineering and are designed to mislead and attach to other programs.

  FALSE

  TRUE

 5. Trojan horses are designed to access a computer by misleading users of its? intent by prompting to download a program

  FALSE

  TRUE

 6. Viruses cannot affect a user's hard drive, so files saved on the hard disk are always safe.

  FALSE

  TRUE

 7. Sending requests to a single server using hijacked machines is commonly referred to as Phishing

  FALSE

  TRUE

 8. Social engineering, phishing and worms are all examples of viruses.

  FALSE

  TRUE

 9. Data travels across networks in __________-- and these ________are vulnerable to interception.

  bits

  bytes

  herz

  packets

 10. The download and installation of 'patches' can protect organisations against attacks like SQL injections.

  FALSE

  TRUE

 11. An SQL injection can grant an attacker access to a _____________ where they can manipulate or even steal all the data.

  binary tree

  database

  hard disk

  graph

 12. SQL injections typically cause unauthorised access to databases, servers, mainframes as well as directly to the PCs CPU.

  FALSE

  TRUE

 13. Netwok forensics primarily involves the examination of comptuer data that is stored in archives.

  TRUE

  FALSE

 14. What is needed to decrypt an encrypted file?

  A message

  A key

  A hacker

  A bit

 15. Many failures in security can be attributed to human weakness, misunderstanding, misinformation, misdirection, or failure to grasp the importance of prescribed processes and procedures.

  FALSE

  TRUE