1. Which of the following is not a good tactic to use against hackers?
A) Enticement B) Entrapment C) D)
2. Creating which of the following is how a hacker can insure his ability to return to the hacked system at will?
A) rootsec B) checksum C) CRC D) backdoors E) None of the choices.
3. A trojan horse simply cannot operate autonomously.
A) true B) false C) D)
4. Which of the following refers to the collection of policies and procedures for implementing controls capable of restricting access to computer software and data files?
A) Binary access control B) System-level access control C) Logical access control D) Physical access control E) Component access control F) None of the choices.
5. Which of the following is the GREATEST concern when an organization allows personal devices to connect to its network?
A) It is difficult to enforce the security policy on personal devices B) Help desk employees will require additional training to support devices. C) IT infrastructure costs will increase. D) It is difficult to maintain employee privacy.
1. Right Answer: B Explanation: Enticement occurs after somebody has gained unlawful access to a system and then subsequently lured to a honey pot. Entrapment encourages the commitment of unlawful access. The latter is not a good tactic to use as it involves encouraging someone to commit a crime.
2. Right Answer: D Explanation: A backdoor refers to a generally undocumented means of getting into a system, mostly for programming and maintenance/troubleshooting needs. Most real world programs have backdoors. Creating backdoors is how a hacker can insure his ability to return to the hacked system at will.
3. Right Answer: A Explanation: As a common type of Trojan horses, a legitimate software might have been corrupted with malicious code which runs when the program is used. The key is that the user has to invoke the program in order to trigger the malicious code. In other words, a trojan horse simply cannot operate autonomously. You would also want to know that most but not all trojan horse payloads are harmful - a few of them are harmless.
4. Right Answer: C Explanation: Logical access control is about the use of a collection of policies, procedures, and controls to restrict access to computer software and data files.Such control system should provide reasonable assurance that an organization's objectives are being properly achieved securely and reliably.
Leave a comment