Question

In: Computer Science

1. A situation that involves exposure to some type of danger is known as which of...

1. A situation that involves exposure to some type of danger is known as which of the following? a. vector b. risk c. threat d. asset 2. Addressing a risk by making it less serious is known as which of the following? a. acceptance b. transference c. avoidance d. mitigation 3. Which term best describes a computer program that lies dormant until it is triggered by a specific logical event, such as a certain date reached on the system calendar? a. keylogger b. logic bomb c. rootkit d. backdoor 4. Which social engineering approach involves a user masquerading as a real or fictitious character and then plays out the role of that person on a victim? a. phishing b. spam c. impersonation d. watering hole attacks 5. The process of proving that a user performed an action, such as sending an email message, is known as which of the following? a. steganography b. obfuscation c. availability d. non-repudiation 6. Which cryptography algorithm was approved by the NIST in late 2000 as a replacement for DES? a. RC1 b. AES c. IDEA d. Blowfish 7. Which type of DoS attack uses publicly accessible and open DNS servers to flood a system with DNS response traffic? a. SYN flood attack b. DNS amplification attack c. IP spoofing d. smurf attack 8. In which type of attack does the threat actor take advantage of web applications that accept user input without validating it before presenting it back to the user? a. SQL injection b. DNS poisoning c. cross-site scripting (XSS) d. man-in-the-middle (MITM) 9. A means of managing and presenting computer resources by function without regard to their physical layout or location is known as which of the following? a. cloud computing b. on-premises c. virtualization d. software as a service 10. Which of the following is not a password setting in Microsoft Windows group policy? a. Password length b. Password History c. Password alias d. Password complexity e. Password encryption.

Solutions

Expert Solution

1) A situation that involves exposure to some type of danger is known as

  b.Risk

explanation:

-Threat provides an unwanted impact on the computer application or system by a negative action.

-Vector is a gateway or a path which is used by the hacker to access the target application or system.

-Asset refers to the component,data,device which supports information related activities.

2) Addressing a risk by making it less serious is known as

d.Mitigation

  explanation:

-acceptance,avoidance,transference are the risk mitigating strategies.

3) The term best describes a computer program that lies dormant until it is triggered by a specific logical event,such as a certain date reached on the system calendar is

  b.Logic Bomb

  explanation:

- are used for which is meant for creating records of everything that you typed in a mobile keyboard or computer keyboard.

-Rootkit constitutes a collection of computer software which allows someone to control and maintain command over a computer without the computer owner or user knowing about it.

-Backdoor is a method which give access to unauthorized user and authorized user on a computer application,system and network.

4) The social engineering approach where a user masquerades as a real fictitious character and then plays out the role of that person on a victim is known as

  c.Impersonation

   explanation:

-watering hole attack is a method of compromising specific end users in a particular industry through famous websites.

-phishing is a social engineering attack which is used to stael user's data which include login credentials and credit card numbers.

-spam is a huge waste of time resources which consists of unwanted digital communication or mails that sent out in a bulk manner.

5) The process of proving that a user performed an action,such as sending an e-mail message is known as

d.Non-repudiation

  explanation:

- is a technique or art of science which is used to hide information by embedding messages within other, mainly harmless messages.

-obfuscation is the action or practice of making something difficult to understand or unintelligible.

-availability is ability of accessing information or resources in the correct format at a specified location.

6) The cryptographic algorithm which was approved by in late 2000 as replacement of DES is

  b.AES (Advanced Encryption Standard)

  explanation:

- (Release Candidate 1) which is considered fir a general release.

-IDEA (International Data Encryption Algorithm) which is asymmetric key block cipher that is very secure and very publicly known algorithm.

-Blowfish is a symmetric block cipher that can be used as drop-in replacement for IDEA or DES algorithms.

7) The type of attack uses publicly accessible and open DNS servers to flood a system with DNS response traffic is

  b.DNS amplification attack

  explanation:

-SYN flood attack is denial-of-service ()attack which targets any system connected to the Internet and providing TCP(Transmission Control Protocol )services that includes file server,web server,email server.

- IP Spoofing is the process of creating of Internet Protocol packets with a false source of IP address for impersonating other computer system .

-smurf attack is a distributed attack which causes packet flood on the victim by abusing protocol.

8) The attack in  which the threat actor takes advantage of web applications that accept user input without validating it before presenting it back to the user is

  c.Cross-site scripting()

explanation:

-SQL injection is a code injection technique which may destroy your database.

-DNS poisoning is an attack which is used to redirect online traffic to a fraud website which resembles its destination.

-Man -in-the-middle attack() is a cyber attack where the attacker secretly alters the communication between two parties to believe that they are communicating with each other.

9) The technology which means of managing and presenting computer resources by function without regard to their physical layout or location is known as

  c.Virtualization

explanation:

-cloud computing is the delivery of different services through internet,data storage,networking,software and servers.

-on-premises is a network or software installed with in the organization which can only be accessed by the authorized employees.

-Software as a service (SaaS) is method of software licensing on subscription basis which is centrally hosted.

10) The password setting not included in the Microsoft Windows group policy is

c.Password alias

  explanation:

-password length,password history,password complexity,password encryption are all the things included in the password setting of Microsoft Windows Group Policy.


Related Solutions

The type of listening that involves trying to understand a situation from the speaker’s perspective is...
The type of listening that involves trying to understand a situation from the speaker’s perspective is called empathic listening. How do you become more competent in this particular type of listening and why is it an important skill to possess and one in which to improve
1. Which type of chemical bond involves the transfer of electrons?
  1. Which type of chemical bond involves the transfer of electrons? A. Ionic B. Polar covalent C. Nonpolar covalent 2. A polar covalent bond will form between which two atoms? A. Beryllium and fluorine (group 1 and group 7) B. Hydrogen and chlorine (group 7) C. Sodium and oxygen (group 1 and group 6) D. Fluorine and fluorine (group 7) 3. A nonpolar covalent bond will form between which two atoms? A. Potassium and chlorine B. Hydrogen and chlorine...
Part A) What is the danger in an exporting business that chooses to hedge its exposure?...
Part A) What is the danger in an exporting business that chooses to hedge its exposure? Describe what constitutes success and failure, be specific about the HEDGE. Part B) How are economic exposure and economies of scale related. Explain.
Give an example of a situation in which you believe a Type 1 Error is more...
Give an example of a situation in which you believe a Type 1 Error is more serious than a Type II Error. Give an example of situation in which you believe a Type II Error is more serious than a Type 1 Error. In each case, why do you think so?
Briefly describe the following items: 1.Transaction exposure, economic exposure and translation exposure. Which exposure is more...
Briefly describe the following items: 1.Transaction exposure, economic exposure and translation exposure. Which exposure is more relevant to multinational corporation? Please explain 2.Purchasing power parity and Interest rate parity, and their linkage.
1. Evaluating insurance coverage needs involves A Looking at the costs verses the potential for exposure...
1. Evaluating insurance coverage needs involves A Looking at the costs verses the potential for exposure B Only getting coverage that is required by the contract C Only getting coverage required by law D Speaking to the owner and covering what they want 2. High insurance deductible usually means: A lower premiums B Higher premiums C No difference in premium D you are willing to take on more risk 3. Worker's comp will still pay a claim if the worker...
Moral Dilemma A moral dilemma involves a situation in which the agent has only two courses...
Moral Dilemma A moral dilemma involves a situation in which the agent has only two courses of action available, and each requires performing a morally impermissible action.. Plato presents the classic example of a moral dilemma. A man borrows a weapon from his neighbor promising to return it at his neighbors request. One day the neighbor in a fit of rage, asks for the weapon back apparently with the intention to kill someone. The man is faced with a dilemma:...
One of the ways to reduce economic and transaction exposure is to restructure. This restructuring involves...
One of the ways to reduce economic and transaction exposure is to restructure. This restructuring involves shifting sources of revenues and costs to other locations in order to match cash inflows and outflows in foreign currencies. Explain the basics of this approach and did the MNC that you chose to write your report on, undertake any such restructuring? Would this restructuring increase translational risk? Does it make sense for an MNC to reduce one risk at the cost of exposing...
One of the ways to reduce economic and transaction exposure is to restructure. This restructuring involves...
One of the ways to reduce economic and transaction exposure is to restructure. This restructuring involves shifting sources of revenues and costs to other locations in order to match cash inflows and outflows in foreign currencies. Explain the basics of this approach and did the MNC that you chose to write your report on, undertake any such restructuring? Would this restructuring increase translational risk? Does it make sense for an MNC to reduce one risk at the cost of exposing...
A MNC is subject to several different types of exposure: Translation, transaction, and economic. Which type...
A MNC is subject to several different types of exposure: Translation, transaction, and economic. Which type of exposure has the greatest impact on a MNC? Why? Which is the most difficult to manage? Why? Give a specific example in relation to Puerto Rico.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT