Preview

12 - Practice Test

 1. An example of social engineering is the use of a trojan horse.

  TRUE

  FALSE

 2. Malware distribution is legal in most countries and helpful in preventing security breaches.

  TRUE

  FALSE

 3. Viruses are engineered pieces of code that cause great destruction. They do not need to attach themselves to a program unlike worms.

  TRUE

  FALSE

 4. Worms are a type of social engineering and are designed to mislead and attach to other programs.

  FALSE

  TRUE

 5. Trojan horses are designed to access a computer by misleading users of its? intent by prompting to download a program

  FALSE

  TRUE

 6. Viruses cannot affect a user's hard drive, so files saved on the hard disk are always safe.

  TRUE

  FALSE

 7. Sending requests to a single server using hijacked machines is commonly referred to as Phishing

  TRUE

  FALSE

 8. Social engineering, phishing and worms are all examples of viruses.

  TRUE

  FALSE

 9. Data travels across networks in __________-- and these ________are vulnerable to interception.

  herz

  bytes

  bits

  packets

 10. The download and installation of 'patches' can protect organisations against attacks like SQL injections.

  FALSE

  TRUE

 11. An SQL injection can grant an attacker access to a _____________ where they can manipulate or even steal all the data.

  hard disk

  database

  binary tree

  graph

 12. SQL injections typically cause unauthorised access to databases, servers, mainframes as well as directly to the PCs CPU.

  TRUE

  FALSE

 13. Netwok forensics primarily involves the examination of comptuer data that is stored in archives.

  FALSE

  TRUE

 14. What is needed to decrypt an encrypted file?

  A hacker

  A key

  A message

  A bit

 15. Many failures in security can be attributed to human weakness, misunderstanding, misinformation, misdirection, or failure to grasp the importance of prescribed processes and procedures.

  FALSE

  TRUE