Escolar Documentos
Profissional Documentos
Cultura Documentos
a) True
b) False
a) Sometimes encrypted
b) Text files
c) Both (a) and (b) above
d) None of the above
a) Man-after-me attacks
b) Cut-n-run attacks
c) Man-in-the-middle attacks
d) Such attacks have no common descriptors
4) “Web-bugs” and “cookies” are similar in as much as that they are both used to
track the websites visited by people.
a) True
b) False
a) True
b) False
Correct answer: a). Reference: Page: 221.
6) Web browsers typically allow for Web bugs to be turned off by users.
a) True
b) False
a) True
b) False
a) True
b) False
a) A central IP address
b) Multiple distributed IP addresses
c) Peer-to-peer networks
d) None of the above
a) True
b) False
Correct answer: a). Reference: Page 225.
a) Low-level employees
b) Mid-level managers
c) High-level managers
d) Both (b) and (c) above
17) The doctrine of Negligent Hiring Liability holds employers responsible for:
a) MRI
b) SET
c) Intranet
d) EDI
a) An Internet
b) An Intranet
c) An Extranet
d) All of the above
20) Extranets are ________ in scope than ____________, but are only a
subset of the _________.
21) In electronic commerce, ensuring that a message received was in deed sent
by whom it claims to be sent by is called:
a) Proof of Delivery
b) Nonrepudiation
c) Message origin authentication
d) Message integrity
22) In electronic commerce, ensuring that a message received was exactly the
same message that was sent is called:
a) Proof of Delivery
b) Nonrepudiation
c) Message origin authentication
d) Ensuring message integrity
22) On a relative scale, macro viruses are more common than boot viruses.
a) True
b) False
1) Describe the manner in which denial of service attacks are launched. Include
all forms of such attacks.
While student answers to this question will vary, there are several sources
available on the Internet for students to learn about such attacks and their many
forms. Some of these sites are:
http://www.cisco.com/warp/public/707/newsflash.html
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci557336,00.ht
ml
http://www.ddosworld.com/
The government agency could have detected its bootlegged copy of the
software earlier through periodic software audits. These audits use software that
grabs an unused port on the network interface and tries to communicate with
other ports to try and identify duplicate serial numbers from the same software.
The pirated software could have been obtained a variety of ways. The
government agency could have obtained it through a third party, or an employee.
A reseller may have distributed multiple copies of a single software package to
different customers. Some deeply discounted computers may be pre-loaded with
software that is not licensed. Some resellers knowingly sell counterfeit versions
of software to unsuspecting customers. Also, an employee of the government
agency could have installed unauthorized copies of the software on company
computers or illegally downloaded software from the Internet. “Warez” is
commercial software that has been pirated and made available to the public via
the Internet or an electronic bulletin board. Crackers break the software’s
protection and then share illegal copies of the software. Then they distribute it
around the world via the Internet.
Indicators of reseller piracy are multiple users with the same serial
number, lack of original documentation, or an incomplete set, and nonmatching
documentation. Questions the government agency could ask itself are:
1.) Was this software purchased from a reputable dealer?
2.) Did the software come with the original license agreement?
3.) Did the software come in an original floppy disk/CD package?
4.) Did the Windows operating system come with the Certificate of Authenticity?
Proper procedures, good software inventory management, and employee
education could help this government agency deal with piracy issues.