Questions
The following is a short list of review questions to help to reinforce your learning and identify which areas you might need to work on:
- Which of the following is an example of an intangible asset?
A. Computer
B. Operation procedures
C. Customer
D. Employee
- Ensuring a message is not altered during transmission between a source and destination is referred to as which of the following?
A. Hashing
B. Confidentiality
C. Integrity
D. Availability
- Which of the following best describes a person who doesn't fully understand how to perform hacking techniques but follows the instructions given by real hackers?
A. Hobbyist
B. Disgruntled employee
C. Insider threat
D. Script kiddie
- A hacker is attempting to trick people into clicking a malicious link with a text message. What type of attack is this?
A. Smishing
B. Vishing
C. Phishing
D. Spear phishing
- An attacker decided to compromise a DNS server to redirect all users to a malicious domain in the hope the unsuspecting user...