Search for notes by fellow students, in your own course and all over the country.

Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.

My Basket

ICT(COMPUTER HARDWARE AND RESOURCES)£11.25

Title: NETSEC 1 – INTRODUCTION TO NETWORK SECURITY CONCEPTS (2025) –110 MOST TESTED QUESTIONS WITH VERIFIED ANSWERS
Description: THIS DOCUMENT INCLUDES A SERIES OF MULTIPLE-CHOICE AND TRUE/FALSE QUESTIONS DESIGNED FOR STUDENTS STUDYING THE BASICS OF NETWORK SECURITY IN NETSEC 1. TOPICS INCLUDE THE THREAT ENVIRONMENT, CORE SECURITY GOALS (CONFIDENTIALITY, INTEGRITY, AVAILABILITY), TYPES OF ATTACKS, COUNTERMEASURES, AND INCIDENT TERMINOLOGY. EACH QUESTION IS FOLLOWED BY THE CORRECT ANSWER FOR EFFECTIVE STUDY AND EXAM PREPARATION.

Document Preview

Extracts from the notes are below, to see the PDF you'll receive please use the links above


NETSEC 1 – INTRODUCTION TO NETWORK SECURITY
CONCEPTS (2025) –110 MOST TESTED QUESTIONS WITH
VERIFIED ANSWERS
Threat environment consists of the types of attackers and attacks that companies face
...

T/F - CORRECT ANSWER-FALSE

3) The three common core goals of security are ________
...

A) integrity
B) confidentiality
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-A

5) Which of the following are types of countermeasures?
A) Preventative
B) Detective
C) Corrective
D) All of the above - CORRECT ANSWER-D

6) When a threat succeeds in causing harm to a business, this is called a ________
...

A) breach
B) countermeasure
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-A

8) Another name for safeguard is ________
...

T/F - CORRECT ANSWER-FALSE

11) Detective countermeasures identify when a threat is attacking and especially when it is
succeeding
...
- CORRECT ANSWER-FALSE

13) Preventative countermeasures keep attacks from succeeding
...
- CORRECT ANSWER-TRUE

15) Most countermeasure controls are detective controls
...

A) Cross-site scripting
B) SQL injection
C) Denial of service
D) None of the above - CORRECT ANSWER-B

17) About how long was the Sony PlayStation Network offline as a result of the cyber attacks?
A) 3 days
B) 3 weeks
C) 3 months
D) It never went down
...
6 billion - CORRECT ANSWER-B

21) Employees pose an increased risk to organizations as they ofter have access to sensitive parts of
systems
...
- CORRECT ANSWER-TRUE

23) Employees are very dangerous because they ________
...

A) Sabotage
B) Hacking
C) Extortion
D) Denial of Service - CORRECT ANSWER-A

26) Misappropriation of assets is an example of employee financial theft
...
- CORRECT ANSWERTRUE

28) You accidentally find someone's password and use it to get into a system
...
-

CORRECT ANSWER-TRUE
29) Someone sends you a "game
...
This is hacking
...
By accident, you discover that if you hit a certain
key, you can get into someone else's files
...
This is
hacking
...
" - CORRECT ANSWER-FALSE

32) When considering penalties for hacking, motivation is irrelevant
...
" - CORRECT ANSWER-TRUE

34) Penalties for hacking are ________
...
- CORRECT ANSWERFALSE

36) In ________, the perpetrator tries to obtain money or other goods by threatening to take actions
that would be against the victim's interest
...
- CORRECT ANSWER-FALSE

38) In fraud, the perpetrator tries to obtain money or other goods by threatening to take actions
that would be against the victim's interest
...

A) Fraud
B) Extortion
C) Hacking
D) Abuse - CORRECT ANSWER-D

40) ________ is a generic term for "evil software
...

A) Viruses
B) Worms
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-A

42) ________ can spread through e-mail attachments
...

A) viruses
B) worms
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-B

44) The fastest propagation occurs with some types of ________
...

A) exploit
B) compromise
C) payload
D) vector - CORRECT ANSWER-C

46) Nonmobile malware can be on webpages that users download
...
- CORRECT ANSWER-TRUE

48) A program that gives the attacker remote access control of your computer is specifically called a
________
...

A) Trojan horse
B) Trojan pony
C) Stub
D) Downloader - CORRECT ANSWER-D

50) Which of the following can be a type of spyware?
A) A cookie
B) A keystroke logger
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-C

51) Most cookies are dangerous
...
- CORRECT ANSWER-FALSE

53) Which type of program can hide itself from normal inspection and detection?
A) Trojan horse
B) Stealth Trojan
C) Spyware
D) Rootkit - CORRECT ANSWER-D

54) Mobile code usually is delivered through ________
...
- CORRECT ANSWER-TRUE

56) ________ attacks take advantage of flawed human judgment by convincing the victim to take
actions that are counter to security policies
...
)
A) Social engineering
B) Spam
C) E-mail attachment
D) Mobile code - CORRECT ANSWER-A

57) The definition of spam is "unsolicited commercial e-mail
...
Clicking on a link in the message takes
you to a website that seems to be your bank's website
...
This is called a
________ attack
...
)
A) social engineering
B) a hoax
C) phishing
D) spear fishing - CORRECT ANSWER-C

59) You receive an e-mail that seems to come from a frequent customer
...
Clicking on a link in the message takes you
to a website that seems to be your customer's website
...
This is
________
...
)
A) social engineering
B) a hoax
C) phishing
D) spear fishing - CORRECT ANSWER-D

60) Most traditional external attackers were heavily motivated by ________
...
-

CORRECT ANSWER-FALSE
62) Most traditional external hackers do not cause extensive damage or commit theft for money
...

A) thrill
B) validation of power
C) doing damage as a by-product
D) All of the above - CORRECT ANSWER-D

64) Attackers rarely use IP address spoofing to conceal their identities
...
- CORRECT ANSWER-TRUE

66) ICMP Echo messages are often used in ________
...

A) a IP address scanning attack
B) IP address spoofing
C) a port scanning attack
D) None of the above
...
- CORRECT

ANSWER-TRUE
69) The primary purpose for attackers to send port scanning probes to hosts is to identify which
ports are open
...

A) IP address spoofing
B) a chain of attack computers
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-B

71) Following someone through a secure door for access without using an authorized ID card or pass
code is called ________
...
)
A) door hacking
B) social engineering
C) piggybacking
D) shoulder surfing - CORRECT ANSWER-C

72) Watching someone type their password in order to learn the password is called ________
...
- CORRECT ANSWER-TRUE

74) Social engineering is rarely used in hacking
...

A) virus
B) directly-propagating worm
C) DoS
D) bot - CORRECT ANSWER-C

76) Which of the following are examples of social engineering?
A) Wearing a uniform to give the appearance that you work at a business
B) Gaining unauthorized access by following an authorized individual in to a business
C) None of the above
D) All of the above - CORRECT ANSWER-D

77) Generally speaking, script kiddies have high levels of technical skills
...
(Choose the most specific choice
...

A) fix a bug in the bots
B) update bots with new functionality

C) Both A and B
D) Neither A nor B - CORRECT ANSWER-C

80) Botnets usually have multiple owners over time
...

A) automated attack tools
B) dogged persistence
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-B

82) Sophisticated attacks often are difficult to identify amid the "noise" of many ________ attacks
...

A) wizard hacker
B) IT or security employer
C) national government
D) career criminal - CORRECT ANSWER-D

84) Compared to non-computer crime, computer crime is very small
...
- CORRECT ANSWER-FALSE

86) Cybercriminals avoid black market forums
...
To get around this, attackers use ________
...
-

CORRECT ANSWER-TRUE
89) In fraud, the attacker deceives the victim into doing something against the victim's financial selfinterest
...

A) Click fraud
B) Extortion
C) E-theft
D) False reporting - CORRECT ANSWER-A

91) ________ threaten to do at least temporary harm to the victim company's IT infrastructure
unless the victim pays the attacker
...
- CORRECT ANSWER-FALSE

93) Stealing credit card numbers is also known as ________
...
- CORRECT ANSWER-FALSE

95) Under current U
...
federal laws, if a company allows personal information to be stolen, it may be
subject to government fines
...
- CORRECT ANSWER-FALSE

97) If a company wishes to prosecute people or companies that steal its trade secrets, it must take
________ precautions to protect those trade secrets
...
) - CORRECT ANSWER-B

98) Trade secret theft can occur through interception, hacking, and other traditional cybercrimes
...

A) Competitors
B) National governments

C) Both A and B
D) Neither A nor B - CORRECT ANSWER-C

101) Cyberwar consists of computer-based attacks conducted by ________
...

A) before a physical attack
B) after a physical attack
C) Both A and B
D) Neither A nor B - CORRECT ANSWER-C

103) Terrorists can use IT to ________
Title: NETSEC 1 – INTRODUCTION TO NETWORK SECURITY CONCEPTS (2025) –110 MOST TESTED QUESTIONS WITH VERIFIED ANSWERS
Description: THIS DOCUMENT INCLUDES A SERIES OF MULTIPLE-CHOICE AND TRUE/FALSE QUESTIONS DESIGNED FOR STUDENTS STUDYING THE BASICS OF NETWORK SECURITY IN NETSEC 1. TOPICS INCLUDE THE THREAT ENVIRONMENT, CORE SECURITY GOALS (CONFIDENTIALITY, INTEGRITY, AVAILABILITY), TYPES OF ATTACKS, COUNTERMEASURES, AND INCIDENT TERMINOLOGY. EACH QUESTION IS FOLLOWED BY THE CORRECT ANSWER FOR EFFECTIVE STUDY AND EXAM PREPARATION.