Set 02 Flashcards

(10 cards)

1
Q
Q21: Software programs are protected from illegal distribution under what law?
A. SPA
B. Trade Secret
C. Copyright
D. Trademark
A

C. Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q22: What is NOT an aspect of Risk Communication with relation to compliance and accountability?
A. Involvement
B. Education
C. Password Policies
D. Training and inducement of behavior change

A

B. Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q23: Renn defines three basic abstract elements which are at the core most risk assessment methods.
Which element is NOT part of Renn’s definition?
A. Possibility of occurrence (uncertainty)
B. Combination of outcomes and possibility of occurrence.
C. Relationship between risk and security
D. Outcomes that have an impact on what human’s value.

A

C. Relationship between risk and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Q24: Confidentiality based on the \_\_\_\_\_\_\_ of data, is meant to provide a way to control the extent to which an adversary can make inferences about users' sensitive information.
A. Encryption
B. Coding
C. Cryptography
D. Obfuscation
A

C. Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Q25: Which is a type of onion router used to forward data making use of an anonymous communication network?
A. Exit
B. Entry
C. Middle
D. All of above
A

D. All of above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q26: There are many benefits to analyzing malware. First, we can understand the intended malicious activities to be carried out by the malware.
What is the benefit of understanding intended malicious activities?
A. This will not allow us to update our network and endpoint sensors to detect and block such activities.
B. This will help to identify which machines have malware and take corrective actions
C. This will let us remove the malware or even completely wiping the computer clean and reinstalling everything.
D. Both B and C are correct

A

D. Both B and C are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q27: The 1st dimension of our taxonomy is whether male is a standalone (or independent) program or just a sequence of instructions to be embedded in another program.
A. Complete software and its working depend on the type of compromised Operating System
B. It is an incomplete software and is used just for illustration of the Malware program life cycle.
C. An incomplete program and it needs the help of already installed programs to plan for attack.
D. A standalone Malware program is a compete software that can run on its own when installed on a target system and executed.

A

D. A standalone Malware program is a compete software that can run on its own when installed on a target system and executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Q28: Flaws caused by humans frequently arise in design and code which lead to security vulnerabilities,  which discipline has made a big effort in minimizing these faults?
A. Information Technology Discipline
B. CISO
C. Security Architecture.
D. Software Engineering.
A

D. Software Engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Q29: What is a traditional method of obtaining custody of a cyber criminal who is not present within the state?
A. Extradition
B. Indictment
C . Impeachment
D. Recrimination
A

A. Extradition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Q30: The injection of fake data points into data made available in order to hid real samples is called
A. Dummy addition
B. Data injection
C. Suppression
D. None of above
A

B. Data injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly