0% found this document useful (0 votes)
5 views

Assignment 2

The document contains a series of questions and answers related to computer security, networking, and data communication. It covers topics such as cryptojacking, log files, password managers, copyright laws, and various types of cyber attacks. Additionally, it addresses technical concepts like routing, firewalls, and the Health Insurance Portability and Accountability Act (HIPAA).

Uploaded by

ashnay57
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Assignment 2

The document contains a series of questions and answers related to computer security, networking, and data communication. It covers topics such as cryptojacking, log files, password managers, copyright laws, and various types of cyber attacks. Additionally, it addresses technical concepts like routing, firewalls, and the Health Insurance Portability and Accountability Act (HIPAA).

Uploaded by

ashnay57
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Assignment 2 - Questions & Answers

1. ____ Cryptojacking___ reduces the performance of the victim's computer.

2. _____, which are generated by Web server software, record a user’s actions on a Web site.
a. Viruses
b. Log files
c. Junk e-mails
d. Worms

3. _____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000


bps.
a. Narrowband
b. Baseband
c. Broadband
d. Sideband

4. _____ is one of the most popular password managers.


a. FilePro
b. STOPzilla
c. Dashlane
d. CounterSpy

5. According to the 1980 revisions to the Copyright Act of 1976, _____.


a. the owner of a copyrighted program is allowed to make multiple copies or adaptations for
use on other computers
b. copyright holders can perform a copyrighted work by means of digital audio transmission
c. both people and organizations can be held liable for unauthorized duplication and use of
copyrighted programs
d. copyright protection extends to original works of authorship in architectural fields

6. Application-filtering firewalls are less expensive than packet-filtering firewalls.


Select one:
True
False

7. A _____ is a collection of binary digits, including message data and control characters for
formatting and transmitting, sent from computer to computer over a network.
a.
bandwidth
b. protocol
c. packet
d. topology
8. To minimize the invasion of privacy, users and organizations should:
a. use verification procedures to ensure data accuracy.
b. provide wrong data to unauthorized users.
c. keep collected information even after the stated purpose is over.
d. provide access to one’s personal information to all interested parties.

9. In the context of computer crimes and attacks, the difference between phishing and spear
phishing is that:
a. in spear phishing, the attack is targeted toward a specific person or a group.
b. spear phishing involves collecting sensitive information via phone calls.
c. in spear phishing, hackers capture and record network traffic.
d. spear phishing involves monitoring and recording keystrokes.

10. Horizontal scaling of a client/server architecture means _____.


a. migrating the network to a faster communication media
b. adding more proxy servers
c. migrating the network to decentralized servers
d. adding more workstations

11. Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI)
model.
a. Physical layer
b. Network layer
c. Transport layer
d. Data Link layer

12. _____ are small text files with unique ID tags that are embedded in a Web browser and
saved on the user’s hard drive.
a. Kernels
b. Applets
c. Cookies
d. Firewalls

13. Social engineering is an attack that takes advantage of the backdoors in security
systems.
Select one:
True
False

14. The main function of Cyber Incident Response Capability (CIRC) is to _____.
a. create backdoors to bypass security protocols
b. restrict access controls to unauthorized personnel
c. provide level 1 security
d. provide information on security incidents
15. The process of deciding which path that data takes is called routing

16. Which is included in the goal of the Health Insurance Portability and Accountability Act
(HIPAA)?
a. Safeguarding conversations between patients and their families
b. Protecting patients’ credit information
c. Protecting patients’ computer records
d. Safeguarding patients’ billing information

17. Which is true of virtual organizations?


a. They are networks of dependent companies and manufacturers connected via
information technologies.
b. They let independent suppliers share skills and have access to each other’s markets via
information technologies.
c. They need central offices for participants to contribute their expertise.
d. They need an organizational hierarchy for participants to contribute their expertise.

18. A Rootkits is a series of software tools that enable an unauthorized user to gain access
to a computer or network system without being detected.

19. A supercookie tracks a user’s browsing activities even in a privacy mode.


Select one:
True
False

20. Using _____ is a way to solve health issues related to computer equipment.
a. a high speed Internet
b. correct lighting
c. wired keyboards
d. a high capacity RAM

21. In the context of data communication, which of the following media is based on “line of
sight”?
a. A terrestrial microwave
b. A fiber-optic cable
c. A mechanical wave
d. A coaxial cable

22. _____ is a high-speed carrier service that uses ordinary phone circuits to send and
receive data.
a. Code division multiple access
b. A cable modem
c. An analog modem
d. Digital subscriber line

23. Unlike the other disadvantages of wireless, throughput is expected to become a bigger
problem in the future.
Select one:
True
False

24. Which statement is true of firewalls?


a. They cause routers to terminate connections with suspicious sources.
b. They can identify attack signatures, trace patterns, and generate alarms for a network
administrator.
c. They monitor network traffic and use the “prevent, detect, and react” approach to security.
d. They protect against external access, but they leave networks unprotected from internal
intrusions.

25. Which of the following statements is true of a worm?


a. It is an independent program that can spread itself without attaching itself to a host
program.
b. It floods a network or server with service requests to prevent legitimate users’ access to
the system.
c. It is usually hidden inside a popular program, but it is not capable of replicating itself.
d. It enables a system designer to bypass the security of a system and sneak back into the
system later to access files.

You might also like