IEC 818
Quiz #2
Q1. According to Bruce Schneier, good security encompasses several things, which is the best answer below
A. prevention, detection, reaction
B. technology, funding, HR
C. prevention, reaction, completion
D. detection, firewalls, contact with authorities
Q2. D
ata harvesting, surveillance, databases and traffic analysis would be threats associated with
A.
Criminal Attacks
B.
Publicity Attacks
C.
Legal Attacks
D.
Privacy Violations
Q3. Privacy violations. If the attacker wants to know everything about a person, it is called a
A. Data Attack
B. Data Harvesting
C. Targeted Attack
D. Penetration
Q4. A logic bomb is a good example of
A. an external attack
B. an internal threat
C. competitive intelligence
D. risks with business partners
Q5. For the most part, security experts believe the majority of virus attacks are made by
A. business partners.
B. competitive intelligence
C. foreign nationals
D. college and university students
E. unhappy employees and egotistical hackers and crackers.