Preview

10 - Practice Test

 1. An example of social engineering is the use of a trojan horse.

  TRUE

  FALSE

 2. Malware distribution is legal in most countries and helpful in preventing security breaches.

  TRUE

  FALSE

 3. Viruses are engineered pieces of code that cause great destruction. They do not need to attach themselves to a program unlike worms.

  FALSE

  TRUE

 4. Worms are a type of social engineering and are designed to mislead and attach to other programs.

  FALSE

  TRUE

 5. Trojan horses are designed to access a computer by misleading users of its? intent by prompting to download a program

  TRUE

  FALSE

 6. Viruses cannot affect a user's hard drive, so files saved on the hard disk are always safe.

  FALSE

  TRUE

 7. Sending requests to a single server using hijacked machines is commonly referred to as Phishing

  TRUE

  FALSE

 8. Social engineering, phishing and worms are all examples of viruses.

  FALSE

  TRUE

 9. Data travels across networks in __________-- and these ________are vulnerable to interception.

  herz

  bits

  bytes

  packets

 10. The download and installation of 'patches' can protect organisations against attacks like SQL injections.

  FALSE

  TRUE

 11. An SQL injection can grant an attacker access to a _____________ where they can manipulate or even steal all the data.

  graph

  binary tree

  database

  hard disk

 12. SQL injections typically cause unauthorised access to databases, servers, mainframes as well as directly to the PCs CPU.

  FALSE

  TRUE

 13. Netwok forensics primarily involves the examination of comptuer data that is stored in archives.

  TRUE

  FALSE

 14. What is needed to decrypt an encrypted file?

  A message

  A bit

  A hacker

  A key

 15. Many failures in security can be attributed to human weakness, misunderstanding, misinformation, misdirection, or failure to grasp the importance of prescribed processes and procedures.

  TRUE

  FALSE