Information Security MCQs and Notes
R
Q 1. What "layer" of an e-mail message should you consider when evaluating e-mail security?
G
Q 2. This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
P
Q 3. This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.
R
Q 4. This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.
P
Q 5. This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
A
Q 6. This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.
G
Q 7. This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.
R
Q 8. This is a program in which harmful code is contained inside apparently harmless programming or data.
R
Q 9. This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.
S