CSCU
EXERCISE EXAM
Test
Test Number: 1-50
QUESTION 1
Smith receives a emai! "r#m his ba$
i"#rmi% him that it sus&ects a
uauth#ri'e( trasacti# # his acc#ut) T#
&r#tect his acc#ut* the emai! a(vises Smith
t# c!ic$ # a !i$ t# veri"+ his i(etit+ a(
&r#vi(e a+ missi% i"#rmati# i the "#rm)
Smith is a victim #":
A) ,ebsite (e"acemet a( (eia! #" service
) .hishi% attac$)
C) C+berterr#rism
QUESTION 1
Smith receives a emai! "r#m his ba$
i"#rmi% him that it sus&ects a
uauth#ri'e( trasacti# # his acc#ut) T#
&r#tect his acc#ut* the emai! a(vises Smith
t# c!ic$ # a !i$ t# veri"+ his i(etit+ a(
&r#vi(e a+ missi% i"#rmati# i the "#rm)
Smith is a victim #":
A) ,ebsite (e"acemet a( (eia! #" service
) .hishi% attac$)
C) C+berterr#rism
QUESTION
Ste!!a ee(s t# bu+ a %i"t "#r her "rie( # her
birth(a+)
birth(a+) ,hi!e sh#&&i%
sh#& &i% #!ie* a messa%e "r#m
" r#m the
Iteret Service .r#vi(er
.r#vi(er IS.2 &#&s-u&* 3hich ur%es
Ste!!a t# c!ic$ # the !i$ t# veri"+ #r u&(ate her
acc#ut i"#rmati#) I(eti"+ the t+&e #" s#cia!
e%ieeri% attac$4
A) C#m&uter-ase(
C#m&uter-ase( S#cia! E%ieeri%)
) 6uma-ase( S#cia! E%ieeri%
C) S#cia! E%ieeri% Usi% SMS
/) S&am Emai!
QUESTION 7
C+ber crimia!s ca use +#ur c#m&uter t# stea! &ers#a!
a( #ther im&#rtat i"#rmati# "r#m +#u #r (# s#me
mischiev#us activities) 8#h 3hi!e sur9% the Iteret %ets
a &#&-u& a( a( it ta$es
ta$es 8#h t# a 3ebsite that #ers a
"ree %ame "#r his c#m&uter) ,hat is the best c#urse acti#
"#r 8#h4
A) /#3!#a( the %ame #3* a( (eci(e !ater 3hether t#
ista!! # his .C #r %ive the %ame t# his "rie(
) /#3!#a( the %ame* ista!! it* as 8#h ca uista!! the
%ame a+time i" there is a+ &r#b!em
C) Research ab#ut the %ame # the Iteret a( chec$
3hether it is sa"e t# (#3!#a( it #r #t)
/) Chec$ 3hether the 3ebsite is as$i% "#r a+ m#e+) I" it
is "ree* sim&!+ (#3!#a( the %ame
QUESTION ;
Social networking websites such as Facebook and Twitter
Twitter allow
users to create their own personal webpages and connect with
their relatives and friends. Creating webpages on social networking
sites is fun and exciting. What if, while creating a website, the user
is not careful enough which can pave way for hackers and other
malicious users !lisha also created her own webpage on
Facebook. She got a message on her wall saying "#ey !lisha, its
ur uncle Tom$
Tom$ Thanks for the invitation % &unt 'ichel is f( and we
both )ove ur webpage. Wed love to *oin ur friend list$" What does
!lisha have to do now
A) Acce&t the re<uest
) /e+ the re<uest)
C) Acce&t but %ive access t# !ess i"#rmati#
/) /e!ete the 3eb&a%e
QUESTION 5
+t can be convenient to access email and surf the +nternet using a
wireless computer. #owever, wireless networks can be vulnerable to
hackers unless the user takes necessary precautions. onald wants to
make an insurance policy and buy some stock online using his wireless
computer. While investing, the agency re-uires onald to prove his
identity and provide a security token. sing a security token when
investing online allows /ohn to
A) =#% #t# a &ub!ic c#m&uter "#r a &re(etermie( am#ut #"
time
) Carr+ his !a&t#& sa"e!+ #verseas i a c#mmercia! air&!ae
C) >eerate ra(#m &ass-c#(es t# access his #!ie 9acia!
acc#uts 3ith a((e( securit+)
/) 6e(%e his ivestmet b+ m#vi% a &#rti# #" his ivestmet
it# U)S) Securities
QUESTION ?
.ame!a uses Iteret t# chat 3ith her "rie(s* 3#r$
# #@cia! (#cumets* a( ba$ #!ie) She #"te
%ets c#"use( a( c#u!( #t trust the 3ebsites
that she is br#3si% 3he tras"erri% m#e+ t#
her (au%hter) 6#3 ca she esure that the (ata
set bet3ee her c#m&uter a( the ba$i%
3ebsite is ecr+&te(4 Se!ect a!! that a&&!+2
A) + chec$i% the 3ebsite !i$)
) + rea(i% the terms a( c#(iti#s
C) + rea(i% the &rivac+ &#!icies
/) Ti+ &a(!#c$ ic# "#u( at the b#tt#m #" a ,eb
site
QUESTION
)inda banks online to pay her utilities bills, shop,
etc. Which of the following are application%level
encryption protocols that )inda would most likely
use to bank online safely
&. SS) and S!T.
0. 1erisign and S#&2
C. !&34, S!T, and 56
3. 757, 7!', and SS)
QUESTION B
8e 3ats t# sh#& #!ie but is c#cere(
ab#ut a c#m&a+ &rivac+ &#!ic+) ,hat
#!ie &urchase (ecisi# ai( sh#u!( he use4
A) Sh#&b#t
) Trust veri9cati# site)
C) usiess rati% site
/) Sh#&&i% &#rta!s
QUESTION
+ want to re-uest secure web pages using https899.
What port will + need to open on my firewall to
allow these SS)%encrypted packets to flow
&. ::
0. ;<
C. =>
3. ??<.
QUESTION 10
Susan spends most of the time on computer working
and doing other things. Susan left her 7C connected to
+nternet idle for some time. &n attacker, although was
not able to steal any information, remotely utili@ed her
7CAs processor cycles for some of his computationally
intensive task. Classify the above breach of security
&. 3isclosure of information
0. Compromising integrity of the 7C.
C. 3enial of service attack
3. 0uffer overflow attack
QUESTION 11
&nne suspects that her husband is cheating on her. #e
spends most of his time on the +nternet chatting with a woman.
When -uestioned, he says she is a good friend and a
colleague. 6n suspicion, &nne contacted her friend who
happened to be a network security administrator. pon his
instructions, &nne installed a Beylogger when her husband
was away for work. #ow does a Beylogger can help &nne to
know whether her husband is cheating or not
&. +t captures the voice communication of her husband
0. Captures the control panel settings
C. Captures the .pdf 73F%7rintable 3ocument FormatD files
and sends them to her as attachments
3. Captures all the keystrokes that her husband types.
QUESTION 1
Company &0C has various departments that
have developed several private resources that
can be accessed using +nternet protocols. The
company &0C now wants to link these resources
together. What type of network is being described
here
&. +nternet
0. !xtranet
C. +ntranet.
3. 1irtual private network
QUESTION 17
Nac+ 3ats t# sa"e%uar( herse!" a(
&revet her i(etit+ "r#m bei% st#!e) ,hat
3#u!( +#u rec#mme( her t# (# be"#re
thr#3i% a3a+ items 3ith &ers#a!
i"#rmati# # them4
A) ,rite (#3 the i"#rmati# "#r the rec#r(s
) Shre( them #r tear them u&)
C) N#t ecessar+ t# (# a+thi%
/) C#tact the 9acia! istituti# a( veri"+
her trasacti#s
QUESTION 1;
A!!e* a "r#t #@ce eDecutive "r#m At!ata* has
ever ta$e a bac$u& #" his s+stem) 6e is
3#rrie( ab#ut securit+ #" the (ata i case his
s+stem crashes) ,hich #" the "#!!#3i% t+&e #"
bac$u& 3i!! +#u su%%est t# A!!e i" he 3ats t#
ta$e a c#m&!ete bac$u& #" his s+stem4
A) N#rma! /ata ac$u&)
) Icremeta! /ata ac$u&s
C) /ieretia! /ata ac$u&
/) u!! Icremeta! /ata ac$u&s
QUESTION 15
Shar# recet!+ &urchase( a e3 smart &h#e "#r
herse!") ,hi!e eD&!#ri% her &h#e* she trie( t# set
her m#bi!e &h#eFs !uet##th securit+) Shar#
3ats her &h#eFs !uet##th t# be i (e"au!t
#&erati# m#(e) ,hich am#% the "#!!#3i%
#&ti#s Shar# has t# se!ect t# $ee& her m#bi!e i
!uet##thFs (e"au!t securit+ m#(e4
A) N#-secure m#(e)
) =eavi% securit+ u& t# each a&&!icati#
C) E"#rce !i$ ecr+&ti# "#r a!! tra@c
/) Securit+ setti%s (e"au!t t# a m#bi!e &#!ic+ server
QUESTION 1?
&ustin and Stuart are two brothers. &ustin works for a reputed +T
firm and sometimes his *ob re-uires him to work from home
with his 7C connected to the +nternet. When &ustin is away to
work, his brother Stuart uses his 7C. &ustin suspected that his
brother browses +nternet fre-uently and watches porn on his
7C. &ustin wants to -uietly and automatically block all the porn
websites so that his brother does not visit them. What must
&ustin do in order to block the porn websites automatically
&. +nstall scanning tool to scan the system
0. +nstall a firewall that blocks all porn
C. +nstall an antivirus software and activate parental control.
3. +nstall a keylogger
QUESTION 1
Nic$ receive( a emai! &r#m#ti# stati% that
he has 3# a e3 car) The emai! as$s him t#
(e&#sit G;0 t# the se(erFs acc#ut a(
&r#vi(e s#me cre(etia!s) ,hat 3i!! be the
best c#urse #" acti# "#r Nic$ i this situati#4
A) >ive #!+ his s#cia! securit+ umber a(
am#ut
) Sim&!+ (e!ete the emai!)
C) Sca the emai!
/) #r3ar( the mai! t# I "#r ivesti%ati#
QUESTION 1B
Sa(ra s&e(s m#st #" the &#st-#@ce h#urs chatti% t# her
"rie(s # aceb##$) Recet!+ she came t# $#3 re%ar(i%
a %r#u& # aceb##$ - ab+sitter >#es t# 8ai! a"ter she
U&!#a(s This 6ORRI=E ab+ .h#t# O!ie) /ue t#
curi#sit+* she H#ie( the %r#u& t# $#3 m#re ab#ut it) The
"aci!itat#r #" this %r#u& has re<ueste( a!! its members t#
raise "u(s "#r the i#cet babies 3h# are bec#mi% the
victims #" bruta! harassmet) ,hat 3i!! +#u rec#mme(
Sa(ra* 3hether t# H#i the %r#u& #r i%#re it4
A) Quit the aceb##$ %r#u&* it ma+ be a scam)
) Raise "u(s "#r the babies
C) 8ust "aci!itate the %r#u&
/) isit the %r#u& re%u!ar!+
QUESTION 1
Emma &urchase( a e3 c#m&uter rui% ,i(#3s
#&erati% s+stem* 3ith s#me re!ative!+ recet s#"t3are
ista!!e() Emma 3ats t# (isab!e s#me u3ate(
services that are rui% # her c#m&uter) 6#3 (#es
she (isab!e services s# that she ca (isab!e the
uecessar+ &r#%rams4
A) Start -J t+&e Kservices)mscK i search b#D a( &ress
ENTER t# #&e the Services 3i(#3)
) Start -J A!! .r#%rams -J A(miistrative T##!s -J
Services
C) Start -J C#tr#! .ae! -J Services
/) Start -J A!! .r#%rams -J Services
QUESTION 0
Emers# 3#r$s "#r a re&ute( 9ace c#r&) a( has t#
trave! "re<uet!+ t# &!aces) 6is !a&t#& h#!(s critica!
9acia! i"#rmati# re!ate( t# his c!iets a( #ther
busiess (ea!s) =a&t#& the"t ma+ !ea( t# the (isc!#sure
#" i"#rmati# such as c!iet ames* c#9(etia! (ata*
a( #ther 9acia! (etai!s re!ate( t# the c#r&#rate #r
Iteret evir#met) ,hich #" the "#!!#3i% is
rec#mme(e( i #r(er t# &r#tect his !a&t#& "r#m the"t4
A) Ecr+&t a!! the (ata i !a&t#&
) Never !eave the !a&t#& uatte(e()
C) Eab!e >.S trac$i% i !a&t#&
/) .ass3#r( &r#tect the !#%i
QUESTION 1
M#st #" the stu(ets t#(a+ s&e( their time # the Iteret)
The+ share 3ebsites 3ith each #ther usi% the chat r##ms as
users) S#me #" the i#cet $i(s ma+ "a!! &re+ a( visit
ma!ici#us !i$s set t# them that mi%ht either be a $i( #"
tric$ t# %et their &ers#a! i"#rmati# #r #&e a 3eb &a%e that
is #t secure) ,hich #" the "#!!#3i% are the securit+ ti&s +#u
ee( t# "#!!#3 t# esure that +#u (#Ft "a!! tra& "#r IM attac$s4
A) Save a( #&e a+ (#cumets that +#u acce&t "r#m +#ur IM
c#tacts
) /# #t c!ic$ # the !i$s set b+ u$#3 members i the
chat r##m)
C) L#u ee( t# use +#ur &ers#a! emai! I/ t# re%ister t# !i$s
that are set thr#u%h IM
/) /# #t #&e 9!es 3ith the eDtesi# etc)
QUESTION
,hich am#% the "#!!#3i% eD&!#its
&e#&!eFs te(ec+ t# se!ect 3ea$
&ass3#r(s a( uses a !ist #" &re-(e9e(
3#r(s t# (isc#ver the c#rrect &ass3#r(s4
A) >uessi%
) rute #rci%
C) /icti#ar+ Attac$)
/) Sh#u!(er Sur9%
QUESTION 7
,hich #" the "#!!#3i% &ass3#r( 3i!! be the
str#%est4
A) <3ert+
) a(miistrat#r
C) Q5?ra>)
/) m+&ass3#r(
QUESTION ;
,hat is the &r#cess #" ec#(i% i"#rmati#
i a 3a+ s# that #!+ s#me#e 3ith a $e+
ca (ec#(e it4
A) C#m&ressi#
) Ste%a#%ra&h+
C) S+stemic variati#
/) Ecr+&ti#)
QUESTION 5
8#h use( a t##! t# create a ecr+&te( va!ue
simi!ar t#
Kb?7Beee"70?(0e?"ae(e;?aK
re&reseti% a im&#rtat 9!e) 6is et3#r$
a(miistrat#r t#!( him that this va!ue 3i!! be
(ieret ever+ time there is a cha%e i the 9!e)
,hat is 8#h %eerati% i #r(er t# chec$ the
ite%rit+ #" the 9!e4
A) Ecr+&ti# a!%#rithm
) 6ash va!ue)
C) Ecr+&ti# va!ue
/) /ecr+&ti# va!ue
QUESTION ?
The screen below appears while you are browsing the +nternet. What is the
most appropriate action you will take to keep your system secure
&. 4ou have an out of date browser, as indicated by the message. 4ou
will click 7rotect 7C Eow button.
0. 4ou have an out of date browser, as indicated by the message. 4ou
will click pdates button in the left pane.
C. This is probably a malware attack. 4ou will close the screen by
clicking Close D option at the right%top corner of the screen.
QUESTION
#b 3ats t# se( a sh#rt c#9(etia!
messa%e t# Smith* usi% &ub!ic $e+
cr+&t#%ra&h+) 6#3 sh#u!( #b achieve
that4
A) #b sh#u!( ecr+&t it 3ith his &rivate $e+
) #b sh#u!( ecr+&t it 3ith his &ub!ic $e+
C) #b sh#u!( ecr+&t it 3ith SmithFs &rivate
$e+
/) #b sh#u!( ecr+&t it 3ith Smiths &ub!ic
$e+)
QUESTION B
,hich #" the "#!!#3i% s#"t3are &r#%rams
3#u!( eab!e a attac$er t# have a
c#m&!ete c#tr#! #ver a victimFs c#m&uter4
A) irus
) ,#rm
C) Tr#Ha)
/) Pe+!#%%er
QUESTION
Na(a!* the i(ustria!ist "r#m N#r3a+* 3as trave!!i%
"r#m his h#met#3 t# urich "#r busiess
&ur&#se) O the 3a+ his &h#e 3as st#!e b+ a
bur%!ar) ,hich c#(e Na(a! ma+ use t# (eactivate
his &h#e i #r(er t# save his &ers#a! as 3e!! as
c#9(etia! busiess i"#rmati# st#re( i his
&h#e4
A) IMEI c#(e)
) IEMI c#(e
C) 0
/) 0
QUESTION 70
I" +#u ever receive a us#!icite( te!e&h#e
ca!! "r#m s#me#e c!aimi% t# ee( +#ur
&ass3#r(* 3hat 3#u!( +#u (#4
A) Re"use a( re&#rt imme(iate!+)
) ,rite the &ass3#r( # a &iece #" &a&er*
&ut it i a eve!#&e a( se( it b+ mai!
C) Te!! himher the &ass3#r( a( cha%e it
the "#!!#3i% (a+
/) Se( himher the &ass3#r( via emai!
QUESTION 71
8as# is s$e&tica! #" the securit+ #" his Iteret c#ecti#) 6e sus&ects
that his s+stem is i"ecte( 3ith s#me Tr#Ha 3hich c#ects t# a rem#te
attac$er a( se(s sesitive (ata) O rec#mme(ati# #" #e #" his
"rie( 3h# is a et3#r$ a(miistrat#r* 8as# rus a ,i(#3s c#mma(
t# 9( #&e &#rts* services* a( a&&!icati#s ass#ciate( 3ith these
services) O rui% the c#mma( "r#m the c#mma( &r#m&t* 8as#
%ets "#!!#3i% scree:
,hich c#mma( is 8as# rui%4
A) etstat a
) etstat b)
QUESTION 7
,hich #" the "#!!#3i% attac$ uses a hi%h!+
(irecti#a! atea a( a !a&t#& t#
estab!ish c#ecti#s 3ith !uet##th-
eab!e( (evices "r#m #ver a ha!"-mi!e
a3a+4
A) !uesi&i%)
) !ueHac$i%
C) u''i% attac$
/) !uesar9%
QUESTION 77
The N#rth Car#!ia base( hea!thcare c#m&a+
st#re( me(ica! (ata #" cust#mers 3ith#ut
im&!emeti% &r#&er i"#rmati# securit+ c#tr#!s
3hich !e( t# the (isc!#sure #" me(ica! rec#r(s #"
hu(re(s #" its cust#mers) ,hich #" the "#!!#3i%
act ca be iv#$e( a%aist the c#m&a+4
A) 6I.AA)
) ER.A
C) .CI /SS
/) AA.IE
QUESTION 7;
The following diagram shows a network device that is used for
connecting the modem to the network and determining the next network
point to which a packet should be forwarded. This device can access the
address of a network layer and can have incorporated software that
helps it identify the possible paths between the addresses and the
appropriate channels to transmit data.
I(eti"+ the (evice)
A) 6ub
NICs
QUESTION 75
The a(vace( ecr+&ti# sta(ar( AES2 is
a iterate( s+mmetric b!#c$ ci&her (e9e( i
I.S* 3hich meas that it 3#r$s b+ re&eati%
the same (e9e( ste&s mu!ti&!e times) ,hat
$e+ !e%th (#es AES #t su&&#rt4
A) 1B-bit
) 51-bit)
C) 5?-bit
/) 1-bit
QUESTION 7?
L#ur I. a((ress ca !i$ +#ur Iteret activities
(irect!+ t# +#uV it ca be use( t# 9( +#ur ame
a( !#cati#) S# &r#tecti% +#ur O!ie I(etit+ is a
must* thus A#+m#us ,eb Sur9% a( the abi!it+
t# hi(e +#ur I. a((ress are ma(at#r+ i #r(er t#
esure a hi%h !eve! #" #!ie &r#tecti#) ,hich #"
the "#!!#3i% is a I. A((ress 6i(i% T##!4
A) TOR)
) 6i(er I.
C) A#+m#us Use
/) M+ I.
QUESTION 7
,hich #" the "#!!#3i% 3i!! he!& &revet
uautheticate( access t# the 3ire!ess
et3#r$4
A) 6TT. a( .N
) .N a( I&sec)
C) 6TT. a( ,E.
/) I.sec a( 6TT.
QUESTION 7B
,hat (#es a user (# i" he (#es #t 3at
ever+#e # the et3#r$ t# access his share(
(is$ #r "#!(er4
A) Create a hi((e share b+ a((i% a &erceta%e
si% W2 t# the e( #" the share ame
) Create a hi((e share b+ a((i% a (#!!ar si%
G2 t# the start #" the share ame
C) Create a hi((e share b+ a((i% a (#!!ar si%
G2 t# the e( #" the share ame)
/) Create a hi((e share b+ a((i% a &erceta%e
si% W2 t# the start #" the share ame
QUESTION 7
Secure S#c$ets =a+er SS=2 is the sta(ar( securit+
tech#!#%+ use( t# create a secure c#mmuicati#
chae! bet3ee a server a( a c!iet) SS= isures
that:
A) A!! i"#rmati# trasmitte( bet3ee the 3eb server
a( the br#3ser is set via a thir( &art+ service
&r#vi(er
) A!! i"#rmati# trasmitte( bet3ee the 3eb server
a( the br#3ser is ecr+&te()
C) A!! i"#rmati# trasmitte( bet3ee the 3eb server
a( the br#3ser is veri9e( b+ a certi9cate auth#rit+
/) #th C
QUESTION ;0
8as# ca!!s a c#m&a+Fs he!& (es$ a( sa+s he
has "#r%#tte his &ass3#r() 6e a((s that i" he
misses the (ea(!ie # a bi% a(vertisi%
&r#Hect* his b#ss mi%ht 9re him) ,hat eDact!+
is 8as# tr+i% t# (#4
A) Ma$e "rie(s 3ith the he!& (es$ eDecutive
) Usi% s#cia! e%ieeri% t# eDtract
i"#rmati# "r#m the he!& (es$ eDecutive)
C) Tr+i% t# hac$ the &ass3#r(
/) Tr+i% t# create a s#cia! et3#r$
QUESTION ;1
+dentify the authorities represented by &, 0, and C in a
digital certificate setup as depicted in following diagram8
A) A - Re%istrati# Auth#rit+ RA2* - a!i(ati# Auth#rit+ A2* C - Certi9cate Auth#rit+ CA2
) A - Certi9cate Auth#rit+ CA2* - Re%istrati# Auth#rit+ RA2* C - a!i(ati# Auth#rit+ A2
C) A - Re%istrati# Auth#rit+ RA2* - Certi9cate Auth#rit+ CA2* C - a!i(ati# Auth#rit+ A2)
/) A - Certi9cate Auth#rit+ CA2* - a!i(ati# Auth#rit+ A2* C - Re%istrati# Auth#rit+ RA2
QUESTION ;
The "#!!#3i% (ia%ram i!!ustrates h#3 a 9!e #r
"#!(er ca be ecr+&te( i a ,i(#3s s+stem)
,hich ative ecr+&ti# s+stem ,i(#3s uses t#
secure 9!es4
A) A(vace( Ecr+&ti# S+stem AES2
) Ecr+&te( i!e S+stem ES2)
QUESTION ;7
8#h* 3hi!e sur9% the 3eb "#r basic c#m&uter
securit+ measures* !eart that a!! the (is$ (rives
sh#u!( be "#rmatte( 3ith the NTS 9!e s+stem) 6e
chec$e( his s+stem a( (isc#vere( that his /:
(rive is "#rmatte( 3ith the AT 9!e s+stem) ,hich
#" the "#!!#3i% c#mma( 8#h ca use t# c#vert
the (rive "r#m AT t# NTS i a ,i(#3s s+stem4
A) c#vert /: c#vert "at t"s
) c#vert /: "s:t"s)
C) c#vert /: "s:"at t"s
/) c#vert /: "s:t"s "at
QUESTION ;;
#b h#!(s a cre(it car( "r#m a re&ute( ba$) 6e
use( the car( t# &urchase %##(s at
htt&s:ama'#)c#m* but 3he the ba$
statemet 3as issue(* he ca!!e( the ba$ a(
c!aime( that he ever auth#ri'e( the
trasacti#) Cate%#ri'e this "rau(4
A) Cre(it car( mai! #r(er "rau(
) S$immi%c#uter"eit cre(it car(
C) Char%ebac$ "rau()
/) Car(-#t-&reset CN.2 "rau(
QUESTION ;5
S#me #" the c#mm# threats t# 3ire!ess et3#r$s
ic!u(e eaves(r#&&i%* (ata iterce&ti# a(
m#(i9cati#* (eia!-#"-service* s&##9%* etc) ,hich
#e #" the "#!!#3i% seteces (escribes s&##9%4
A) A attac$er mas<uera(i% as a !a3 e"#rcemet
auth#rit+ t# %ai access t# the 3ire!ess et3#r$
) A attac$er usi% t##!s t# 9( 3ire!ess access
&#its 3here the+ ca &ic$ u& a SSI/ br#a(cast
C) It is a i!!e%itimate techi<ue #" %aii% access b+
mas<uera(i% as a !e%itimate user)
/) /) A attac$er shutti% (#3 the access &#its b+
Hammi% the ra(i# 3aves
QUESTION ;?
,hich #" the "#!!#3i% is true c#si(eri% E-mai!
threats4
A) .hishi% mai!s !ure victims t# &r#vi(e &ers#a! (ata)
) I h#aD mai!* the user ma+ receive s&am mai!s that
c#tai ma!3are* a!!#3i% attac$ers t# ta$e c#tr#!
#" the users c#m&uter
C) I s&ammi%* the user ma+ receive threatei%
emai!s that c#tai "a!se i"#rmati#* isisti% that
he #r she "#r3ar(s the emai!
/) 6#aD mai! c#tais attachmets that ma+ c#tai a
virus* tr#Ha* 3#rm* $e+!#%%ers* a( m#reV #&ei%
such attachmets i"ects the c#m&uter
QUESTION ;
R#bi "re<uet!+ uses his cre(it car(s t# sh#& #!ie)
6e 3as sh#c$e( !##$i% at his recet cre(it car(
statemet as he (isc#vere( s#me etries "#r items
that he ever &urchase() O chec$i% 3ith the #!ie
sh#&* he 3as t#!( that the+ have #t (#e it a( it
mi%ht have cre&t i (ue t# s#me securit+ &r#b!ems i
cre(it car( &r#cessi%) ,hich #" the "#!!#3i%
sta(ar(s 3i!! he!& R#bi t# res#!ve this issue4
A) 6I.AA
) EMA
C) .CI /SS)
/) ER.A
QUESTION ;B
,hich #" the "#!!#3i% attac$ iv#!ves
a#+m#us!+ se(i% a e!ectr#ic
busiess car( #r &h#t# t# a#ther
!uet##th user4
A) !uesi&i%
) !ueHac$i%)
C) u''i% attac$
/) !uesar9%
QUESTION ;
htt&:333)eD&eria)c#m*
htt&:333)e<ui"aD)c#m* a(
htt&:333)trasui#)c#m are eDam&!es #"
cre(it re&#rti% a%ecies) L#u sh#u!( c#tact
these a%ecies i" sus&ect that +#ur i(etit+ is
st#!e) These a%ecies 3i!! he!& +#u i:
A) Ivesti%ati% 3h# has st#!e the i(etit+
) Rec#veri% +#ur !#ss #ut #" i(etit+ the"t
C) .r#tecti% "r#m !#sses (ue t# i(etit+ the"t)
/) Creati% a e3 i(etit+ "#r +#u
QUESTION 50
A attac$ that is ite(e( t# severe!+ !imit
access t# et3#r$ res#urces* Iteret* #r
#ther services is c#mm#!+ re"erre( t# as:
A) .hishi%
) S&##9%
C) /eia! #" service)
/) uer #verY#3