MANG3778 Ch 5 Complete Exam Questions
With Correct Answers
_______ are used for penetration testing by a business. - answer✔white hat hackers
Individuals with information technology skills who break into systems for malicious purposes
such as extortion are termed ____________. a. white hat hackers
b. trojan attackers
c. none of the other choices
d. script kiddies
e. black hat hackers - answer✔black hat hackers
A ____________ travels from computer to computer in a network and consumes resources but
does not usually erase data. - answer✔worm
A programming routine built into a system to bypass system security and enter the system is
called a/an ___________________.
a. none of the other choices
b. firetrap
c. IDS
d. logic bomb
e. backdoor - answer✔e. backdoor
A/An ______________ acts as a filter between a private network and external networks such as
the internet.
a. IDS
b. none of the other choices
c. firewall
d. DoS
e. backdoo - answer✔c. firewall
A ______________ is an attack in which the malicious code waits for a particular event or time
before unleashing its malicious action.
a. None of the other choices
b. Trojan
c. Logic Bomb
d. Backdoor
e. Virus - answer✔c. logic bomb
A security problem is discovered in the code used in a company. The software vendor issues a
_________________ to fix the problem. - answer✔security patche
A DBA goes on a two week vacation. The DBA posts this information on her Facebook account
prior to departure and provides daily updates of the vacation. This opens up the business to a
_________________. a. none of the other choices.
b. brute force password attack
c. social engineering attack
d. adware attack
e. virus attack - answer✔social engineering attack
_______________ refers to the identification of the user by the IT system.
a. confidentiality
b. integrity
c. authentication
d. authorization
e. availability - answer✔c. authentification
A clinic's medical records are securely stored. The system is down and users are unable to
access the data. This is a problem with system _______________.
a. confidentiality
b. integrity
2|Page
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Brightstars. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.