Is4560 Hacking And Countermeasures Essay

3935 words - 16 pages

IS4560 Hacking and Countermeasures


Course Revision Table
Change Date
Updated Section
Change Description
Change Rationale
Implementation Quarter

Credit hours: 4.5
Contact/Instructional hours: 60 (30 Theory, 30 Lab)
Prerequisite: NT2580 Introduction to Information Security or equivalent
Corequisite: None

1. Scope
This exam covers Units 1–5 and is based on the following content from the textbook:
Chapter 1, “Hacking: The Next Generation”
Chapter 2, “TCP/IP Review”
Chapter 3, “Cryptographic Concepts”
Chapter 4, “Physical Security”
...view middle of the document...


6. If money is the motivation now, what was the motivation for previous generations of hackers?

a. Money
b. Fame
c. Source code access
d. Creation of botnets

7. Red teams, sneakers, and tiger teams are all examples of _________.

a. white hat hackers
b. hacktivists
c. social engineers
d. phreaks

8. Which fallacy is described by the quote “Accessing a system without authorization is okay, as long as nothing is stolen or damaged in the process”?

a. The computer game fallacy
b. The law-abiding citizen fallacy
c. The no-harm was done fallacy
d. The hacker fallacy

9. Attacking a company’s Web applications to prevent them from being vulnerable is an example of which of the following?

a. Ethical hacking if you are an employee
b. A legal activity if the application is one you use
c. Black hat hacking
d. Ethical hacking if you disclose the vulnerabilities

10. Which of the following sets the ethical standards?

a. Individuals
b. The government
c. Peer groups
d. Professional organizations and certifying bodies

11. What does hashing provide?

a. A guaranteed unique string for each file hashed
b. A quick way to check the author of a file
c. Cryptographic security
d. A fixed length string that represents the original file

12. Which capability of cryptography ensures that data can be verified as being valid and trusted?

a. Authenticity
b. Privacy
c. Integrity
d. Non-repudiation

13. What does losing the encryption key to stored data signify?

a. The passphrase must be re-created.
b. The data is typically lost.
c. The data can be recovered by hashing the stored file.
d. The data is no longer secure.

14. What can a digital signature provide?

a. Authentication
b. Integrity
c. Non-repudiation
d. Authentication, integrity, and non-repudiation

15. Symmetric encryption requires which of the following?

a. Both the parties should send the same length message.
b. Both the parties should use the same key.
c. Both the parties exchange messages only.
d. Both parties must exchange keys and handshakes.

16. Asymmetric encryption does not require ___________.

a. key exchange
b. secret keys
c. multiple keys
d. secure initial key exchange

17. Attacks against ciphers that feed information into a system and observe output are:

a. Ciphertext only
b. Known plaintext
c. Chosen plaintext
d. Chosen ciphertext

18. Symmetric encryption faces difficulty due to what issue?

a. Security
b. Key exchange
c. Bit length
d. Software expense

19. What attack is being used if two messages are found to have the same message digest?

a. Brute force
b. Known plaintext
c. Birthday attack
d. Collision

20. The encryption used for Web traffic is _________.

a. MD5
b. SHA1
c. SSL
d. SSH

21. What database of financial records should penetration testers review?

d. SECWeb

22. What technique should be used to secure DNS?


Other Essays Like IS4560 Hacking and Countermeasures

Information Security In Business Organizations Essay

3793 words - 16 pages ;Availability, which means ensuring timely and reliable access to and use of information.Effective information security depends on taking a multi-layered approach, combining technical, organisational and legal countermeasures.1.0 Security and Information SystemsSecurity and control of information systems is very important, however, often overlooked by some companies. Companies have to depend on information system to manager their core business. Once the

Ethical Hacking Essay

5637 words - 23 pages standards. This chapter also covers wireless authentication, wardriving, and wireless hacking tools and countermeasures. Chapter 12, “Cryptography,” summarizes the history and principles of cryptography, explains encryption algorithms and public key infrastructure components, and offers examples of different attacks on cryptosystems. Chapter 13, “Network Protection Systems,” covers a variety of devices used to protect networks, such as routers

The Separation Of Capital Ownership And Control

1577 words - 7 pages The argument of whether the separation of capital ownership and control is an efficient form of organization has constantly been a controversial issue. The criticism whether the controllers’ act is in the best interest of the owners’ wills never end as long as hired managers operate management. As the number of public companies has been increasing over the course of this century, meanwhile the American style of contact based corporation has

The Versatility And Flexibility Of OLED's

1014 words - 5 pages In April 1, 2002, organic light emitting diodes gain rise in the scientific community with their published, more practical form at Ames Laboratory. “Scientists at the U.S. Department of Energy's Ames Laboratory, in collaboration with scientists at the University of Michigan, Ann Arbor, have developed and demonstrated a novel, fluorescence-based chemical sensor that is more compact, versatile and less expensive than existing technology of its

Comparing The Moral Virtues Of Antony And Julian The Apostate

1103 words - 5 pages Roman emperor Julian the Apostate and Christian leader Antony both exhibited many qualities of character during their existence. Both of them led very distinctive lives although shared several ethical values. Book 25 of “The Later Roman Empire” and the book “Early Christian Lives” show concrete evidence of this. In the following essay, I will argue how both leaders’ lives were devoted to their religious beliefs and their mutual cardinal virtues

Living In A Cashless Society

1637 words - 7 pages Money in a traditional sense no longer exists. Money is becoming much of a concept than a physical material, and most ordinary bitter have not see the reality of the switch. People today are using credit and debit cards on a regular basis and in everyday situations such as meal purchased at fast food, highway tolls, clothing, groceries, gas stations, etc. all of these means of systems could be regarded as a cashless society or world. The

The French And Indian War: The "Real" First World War

1955 words - 8 pages The Seven Years War, or more commonly referred to as “The French and Indian War”, has been called the true First World War. In this book The French and Indian War: Deciding the Fate of North America, the author and historian Walter R. Borneman paints a detailed and elaborate picture that justifies the claim of it being the first true war of global proportions. If ever there truly was a climax to the never ending feud of the European

Is The Use Of Animals In Medical Research A Necessary Measure?

1513 words - 7 pages Throughout history, animals have been used in experiments to test product safety and obtain medical knowledge that benefits both humans and animals alike. Every year there are numerous medical breakthroughs, such as medications and surgical instruments, which are tested on animals to insure their safety before they are deemed acceptable for human use. Even though the results of the experiments saved millions of human lives, they are also

Education And The Evolving Job Market

2363 words - 10 pages The lives of students today are changing. They are preparing for lives and jobs that have never before existed. If teachers hope to have a significant and worthwhile impact on these quickly changing lives, they must change the way they think, prepare, and instruct our future generations. Children cannot afford to have teachers who remain stagnant in their methods and ideals. Students crave instructors that are willing to allow them to tap

Young And Relentless

1737 words - 7 pages There are numerous influences that can be responsible of teenager’s behaviors and attitude as they develop. One factor that is important to these behaviors is parental figures being over involved or uninvolved in their children’s lives. Many of these effects include illegal substance abuse, rising sexual activity, underage alcohol consumption, and tobacco use. Studies show parental participation plays a key role in the characteristics developed

The Natural Law Theory

1231 words - 5 pages Obeying by the natural law theory is the only true and moral way to live life; especially a life lived in God’s image. God’s presence is a guiding factor to obtaining a moral and virtuous life, which can only be obtained by following the natural law theory. God created a set of laws as a supreme guide for humans to live life, like any law these laws were created to ensure wellbeing for everyone. The laws he created are the civil law, the natural

Related Papers

Penetration Test Plan Essay

584 words - 3 pages obtained from the network and any information regarding exploitation of vulnerabilities and the attempt to gain access to sensitive data. Overview: After the results have come back from the penetration testing and have been shared with The Fitness Club, Malcolm Testing Solutions will discuss security countermeasures that may need to be set in place to prevent exploitations in the future. The access control security countermeasures will depend on the

Identifying Potential Malicious Attacks Essay

1095 words - 5 pages software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software.   Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk.  As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port

Network Security Essay

1925 words - 8 pages ? Second, what relationship if any does the internet have under international law? Between the years of 2007 – 2009 several major incidents occurred that forever changed the way governments view internet cyberspace. The hacking attacks of Estonia in 2007, the Georgia cyber attacks during the Georgia-Russia War in 2008, and the release of the Stuxnet worm to hinder Iran’s nuclear program in 2009 all enhanced the support for military

Ciisp Exam Essay

4138 words - 17 pages . 87. Improving employee motivation and job satisfaction is a countermeasure against all but which of the following attacks? D: Fraud requires additional countermeasures, such as job rotation, mandatory vacations, audit trails, etc. 88. Trusted recovery is concerned with all but which of the following conditions? A: Trusted recovery is not concerned with the hot swapping of a failed RAID member drive. 89. The most important