globalessaywriters-essay-writing agency

A ping sweep

A ping sweep

A) Sends ICMP echo requests to the target machine

Need Help Writing an Essay?

Tell us about your assignment and we will find the best writer for your paper.

Write My Essay For Me

B) Is an exploit that creates a denial of service (DoS) using ICMP echo requests

C) Is a method of clearing your network

D) Determines what services are running on a system

2.

What is an unstructured threat?

A) An attack that is uncoordinated, nonspecific, and lasts a short amount of time

B) An elite hacker who mounts an attack against a specific target

C) A poorly engineered building

D) A type of malicious code that formats the hard drive on a computer.

3.

In 2009 _______________ was cut and resulted in widespread phone and Internet

outages in the San Jose area of California.

4.

A successful attack on a network may adversely impact security in all the following ways

EXCEPT:

A) Loss of confidentiality

B) Loss of integrity

C) Loss of functionality

D) Loss of availability

5.

Which of the following is not one of the three general methods used in authentication?

A) Something you do

B) Something you have

C) Something you are

D) Something you know

6.

Authentication means that the person who sends and e-mail will be unable to deny

sending the e-mail.

A) True

B) False

7.

The first step an administrator can take to reduce possible attacks is to

A) Install a firewall

B) Ensure all patches for the operating system and applications are installed

C) Configure an intrusion detection system

D) Install anti-spyware software

8.

The term “script kiddies” refers to

A) A children’s television show

B) A type of video game

C) A hacker of low-end technical ability

D) An Internet site for peer-to-peer music sharing

9.

As the level of sophistication of attacks _________, the level of knowledge necessary to

exploit vulnerabilities decreased.

Correct Answer(s): increased

10.

A person who tries to gradually obtain information necessary to compromise a network—

by first appealing for help, and then, if necessary, by a more aggressive approach—is a(n)

__________.

A) phreaker

B) social engineer

C) hacktivist

D) terrorist

11.

Ensuring that users have access only to the files they need to complete their tasks is an

example of which principle?

A) Least privilege

B) Implicit deny

C) Keep it simple

D) Separation of duties

12.

The ability to manage whether a subject can interact with an object is called

_______________.

Correct Answer(s): access control

13.

Fifty years ago, few people had access to a computer system or network, so securing

them was a relatively easy matter.

A) True

B) False

14.

Vladimir Levin was able to steal $10 Million from _______________ by using its cash

management system.

15.

The hacker was successful in breaching the firewall, the packet filtering router, and the

internal firewall, but was quickly detected and unable to get past the workstation personal

firewall. This is an example of what principle?

A) Job rotation

B) Layered security

C) Security through obscurity

D) Diversity of defense

Welcome to one of the most trusted essay writing services with track record among students. We specialize in connecting students in need of high-quality essay writing help with skilled writers who can deliver just that. Explore the ratings of our essay writers and choose the one that best aligns with your requirements. When you rely on our online essay writing service, rest assured that you will receive a top-notch, plagiarism-free A-level paper. Our experienced professionals write each paper from scratch, carefully following your instructions. Request a paper from us and experience 100% originality.

From stress to success – hire a pro essay writer!

PLACE YOUR ORDER