Skip to main content

MSTM5003 Week 1 Quiz

 

Your Answers:

Results for question 1.

1.5 / 1.5 points
What was the primary lesson learned from the Slammer worm?
Correct answer:

Results for question 2.

1.5 / 1.5 points
Criminal activity on the Internet, at its most basic, is quite different from criminal activity in the physical world.
Correct answer:

Results for question 3.

1.5 / 1.5 points
What name was given to the advanced persistent threat (APT) style spy network responsible for bugging the Dalai Lama’s office?
Correct answer:

Results for question 4.

1.5 / 1.5 points
Most current ransomware attacks use a hybrid encrypting scheme, locking the files on a victim’s computer until a ransom is paid.
Correct answer:

Results for question 5.

1.5 / 1.5 points
True zero-day vulnerabilities are used often and quickly because once used, they will be patched.
Correct answer:

Results for question 6.

1.5 / 1.5 points
Which suspected nation-state malware platform poses interest because of its stealth, its complexity, and its ability to hide its command and control network from investigators?
Correct answer:

Results for question 7.

1.5 / 1.5 points
Which term refers to an attack conducted against a site with software that is vulnerable to a specific exploit?
Correct answer:

Results for question 8.

1.5 / 1.5 points
In many early cases of computer crime, the perpetrator of the crime intended to cause damage to the computer.
Correct answer:

Results for question 9.

1.5 / 1.5 points
Which Internet criminal is famous for conducting his attacks using a number of different “tools” and techniques, including social engineering, sniffers, and cloned cellular telephones?
Correct answer:

Results for question 10.

1.5 / 1.5 points
When internal threat actors pursue their attacks, they have an additional step to take: the establishment of access to the system under attack.
Correct answer:

Results for question 11.

1.5 / 1.5 points
Which term refers to the design and operation of elements to ensure the proper functional environment of a system?
Correct answer:

Results for question 12.

1.5 / 1.5 points
What concept allows us to understand the relationship between prevention, detection, and response?
Correct answer:

Results for question 13.

1.5 / 1.5 points
Which security model uses transactions as the basis for its rules?
Correct answer:

Results for question 14.

1.5 / 1.5 points
Which security model developed in the late 1970s addresses integrity?
Correct answer:

Results for question 15.

1.5 / 1.5 points
Which term describes a means of separating the operation of an application from the rest of the operating system?
Correct answer:

Results for question 16.

1.5 / 1.5 points
Which term refers to making different layers of security dissimilar so that even if attackers know how to get through a system that comprises one layer, they may not know how to get through a different type of layer that employs a different system for security?
Correct answer:

Results for question 17.

1.5 / 1.5 points
Because of the nature of trust and its high-risk opportunity, the sage advice is to develop and maintain a culture embracing trust.
Correct answer:

Results for question 18.

1.5 / 1.5 points
Which security concept uses the approach of protecting something by hiding it?
Correct answer:

Results for question 19.

1.5 / 1.5 points
Implicit deny applies to situations involving both authorization and access.
Correct answer:

Results for question 20.

1.5 / 1.5 points
Which security principle is characterized by the use of multiple, different defense mechanisms with a goal of improving the defensive response to an attack?
Correct answer:

Your Answers:

Results for question 1.

1.5 / 1.5 points
Because of malware’s nefarious purpose, there is no criminal distinction between the writers of malware and those who release malware.
Correct answer:

Results for question 2.

1.5 / 1.5 points
What name was given to an intellectual property attack executed against oil, gas, and petrochemical companies in the United States?
Correct answer:

Results for question 3.

1.5 / 1.5 points
Today, the data stored and processed by computers is almost always more valuable than the hardware.
Correct answer:

Results for question 4.

0 / 1.5 points
True zero-day vulnerabilities are used often and quickly because once used, they will be patched.
Incorrect answer:
Correct Answer:False

Results for question 5.

1.5 / 1.5 points
Most current ransomware attacks use a hybrid encrypting scheme, locking the files on a victim’s computer until a ransom is paid.
Correct answer:

Results for question 6.

1.5 / 1.5 points
What was the primary lesson learned from the Slammer worm?
Correct answer:

Results for question 7.

1.5 / 1.5 points
Which term describes a category of attacks that generally are conducted over short periods of time (lasting at most a few months), involve a smaller number of individuals, have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders?
Correct answer:

Results for question 8.

1.5 / 1.5 points
One of the hardest threats that security professionals will have to address is that of the insider.
Correct answer:

Results for question 9.

1.5 / 1.5 points
Who is considered to be the ultimate insider, with his name being synonymous with the insider threat issue?
Correct answer:

Results for question 10.

1.5 / 1.5 points
How did the Slammer worm infect computer systems?
Correct answer:

Results for question 11.

1.5 / 1.5 points
Which term is used when separation of privilege is applied to people?
Correct answer:

Results for question 12.

0 / 1.5 points
Which term describes the process where individuals analyze the binaries for programs to discover embedded passwords or cryptographic keys?
Incorrect answer:
Correct Answer:
Reverse-engineering

Feedback

Based on answering incorrectly

Page: 33
Difficulty: Medium

Results for question 13.

1.5 / 1.5 points
Because of the nature of trust and its high-risk opportunity, the sage advice is to develop and maintain a culture embracing trust.
Correct answer:

Results for question 14.

1.5 / 1.5 points
Which term describes a means of separating the operation of an application from the rest of the operating system?
Correct answer:

Results for question 15.

1.5 / 1.5 points
What are the policies of the Biba model?
Correct answer:

Results for question 16.

1.5 / 1.5 points
Which equation describes the operational model of security?
Correct answer:

Results for question 17.

1.5 / 1.5 points
What is one of the most fundamental principles in security?
Correct answer:

Results for question 18.

1.5 / 1.5 points
Which security principle refers to the concept that each and every request should be verified?
Correct answer:

Results for question 19.

1.5 / 1.5 points
What are the three operational tenets found in secure deployments?
Correct answer:

Results for question 20.

1.5 / 1.5 points
The entity that implements a chosen security policy and enforces those characteristics deemed most important by the system designers is known as the __________.
Correct answer:

Comments

Popular posts from this blog

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...