1.    It can involve dumping files to paper or just stealing reports and tapes.
a. Data Leakage
     b. Wire Tapping
     c. Data Tapping
     d. None of the above
        Answer: A. Data Leakage
2. It is eavesdropping on information being transmitted over communication lines.
   a. Data Leakage
   b. Wire Tapping
   c. Data Tapping
   d. None of the above
        Answer: B. Wire Tapping
3. It is a malicious or fraudulent code in an authorized or falsely authorized program.
   a. Virus
   b. Backdoors
   c. Worms
   d. Logic Bombs
        Answer: B. Backdoors
4. It causes the insertion of malicious code into other executable code.
   a. Virus
   b. Backdoors
   c. Worms
   d. Logic Bombs
        Answer: A. Virus
5. These are destructive programs that destroy data.
   a. Virus
   b. Backdoors
   c. Worms
   d. Logic Bombs
        Answer: C. Worms
6. These are Programs that do not self-replicate but rather are programed to detonate.
   a. Virus
   b. Backdoors
   c. Worms
   d. Logic Bombs
        Answer: D. Logic Bombs
7. Wire driving ___________.
   a. Involves the unauthorized use of resources.
   b. Involves receiving wireless data from a laptop.
   c. Disrupts or denies legitimate user services to a particular are or network.
   d. None of the above.
       Answer: B. Involves receiving wireless data from a laptop.
8. Vigie wants to make sure that her system is designed in a manner that allows tracing
   actions to an individual. Which phase of access control is Vigie concerned about?
   a. Identification
   b. Authentication
   c. Authorization
   d. Accountability
       Answer: D. Accountability
9. During which phase access control does the system answer the question “Where can
   the requestor access?”
    a. Identification
    b. Authentication
    c. Authorization
    d. Accountability
        Answer: C. Authorization
10. Which type of authentication includes smart cards?
    a. Knowledge
    b. Ownership
    c. Location
    d. Action
        Answer: B. Ownership
11. It is the central part of a computing environment’s hardware, software and firmware that
    enforces access control.
    a. Security Kernel
    b. CPU
    c. Memory
    d. Motherboard
         Answer: A. Security Kernel
12. Which one of the following is an example of logical access control?
    a. Key for a Lock
    b. Password
    c. Access Card
   d. Fence
            Answer: B. Password
13. Firewall examines each _________ that are entering or leaving the internal network.
    a. Email Users
    b. Updates
    c. Connections
    d. Data Packets
       Answer: D. Data Packets
14. It begins from outer rationale to figure out which password variety might be destined to
    succeed, and afterward proceeds with the simple way to deal with attempt numerous
    potential varieties.
        a. Reverse brute force attack
        b. Simple brute force attack
        c. Hybrid brute force attack
        d. Credential Stuffing
       Answer: C. Hybrid Brute Force Attack
15. In Los Angeles, in October 1998, district attorneys charged four men with fraud for
    allegedly installing computer chips in gasoline pumps that cheated consumers by
    overstating the amounts pumped. This attack is commonly known as _____
        a. Brute Force Attack
        b. Salami Technique
        c. Social Engineering
        d. Spoofing
       Answer: B. Salami Technique
16. I. Email spamming refers to sending email to thousands and thousands of users –
    similar to a chain letter.
    II. Spoofing is a psychological manipulation of people into performing actions or
    divulging confidential information. 
       a.   Statement 1 is true.
       b.   Statement 2 is true.
       c.   Both statements are true.
       d.   Both Statements are false.
       Answer: A. Statement 1 is true
17. Where do most attacks on an organization’s computer resources originate?
      a. From the internet
      b. From inside the network
       c. From universities
       d. From intruders who gain physical access to the computer resources
       Answer: B. From inside the network
18. It is the fraudulent practice of sending emails purporting to be from reputable companies
    in order to reveal personal information, such as passwords, and credit numbers.
         a. Quad Pro Quo
         b. Phishing
         c. Tailgaiting
         d. Baiting
       Answer: B. Phishing
19. These are the following types of Social engineering except
       a. Quad Pro Quo
       b. Phishing
       c. Tailgaiting
       d. Baiting
       Answer: A. Quad Pro Quo
20. It is also known as an exhaustive search, is a cryptographic hack that relies on guessing
    possible combinations of a targeted password until the correct password is discovered.
         a. Salami attack
         b. Brute Force attack
         c. Social Engineering
         d. Spoofing
       Answer: B. Brute Force Attack