Computer Security
- Date January 26, 2022
Quiz Summary
0 of 26 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 26 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 26
1. Question
A vulnerability scanner is
CorrectIncorrect -
Question 2 of 26
2. Question
A packet sniffer is
CorrectIncorrect -
Question 3 of 26
3. Question
These hacker breaks security for altruistic or at least non-malicious reasons.
CorrectIncorrect -
Question 4 of 26
4. Question
This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
CorrectIncorrect -
Question 5 of 26
5. Question
This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
CorrectIncorrect -
Question 6 of 26
6. Question
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs
CorrectIncorrect -
Question 7 of 26
7. Question
It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
CorrectIncorrect -
Question 8 of 26
8. Question
Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.
CorrectIncorrect -
Question 9 of 26
9. Question
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
CorrectIncorrect -
Question 10 of 26
10. Question
These are program designed as to seem to being or be doing one thing, but actually being or doing another.
CorrectIncorrect -
Question 11 of 26
11. Question
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
CorrectIncorrect -
Question 12 of 26
12. Question
Packet Sniffer is
CorrectIncorrect -
Question 13 of 26
13. Question
Rootkit is
CorrectIncorrect -
Question 14 of 26
14. Question
Spoofing attack is
CorrectIncorrect -
Question 15 of 26
15. Question
Security exploit is
CorrectIncorrect -
Question 16 of 26
16. Question
A spoofing attack is
CorrectIncorrect -
Question 17 of 26
17. Question
White hat is
CorrectIncorrect -
Question 18 of 26
18. Question
Grey hat is
CorrectIncorrect -
Question 19 of 26
19. Question
Blue hat is
CorrectIncorrect -
Question 20 of 26
20. Question
Black hat is
CorrectIncorrect -
Question 21 of 26
21. Question
Script kiddie is
CorrectIncorrect -
Question 22 of 26
22. Question
Hacktivism is
CorrectIncorrect -
Question 23 of 26
23. Question
It is a prepared application that takes advantage of a known weakness.
CorrectIncorrect -
Question 24 of 26
24. Question
It is a tool used to quickly check computers on a network for known weaknesses.
CorrectIncorrect -
Question 25 of 26
25. Question
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
CorrectIncorrect -
Question 26 of 26
26. Question
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
CorrectIncorrect