Datasheet
Fundamentals of Security
Prep Test
1
What type of attack involves the hacker tricking a user through social contact?
A ❍ Password attack
B ❍ Eavesdrop attack
C ❍ Man-in-the-middle attack
D ❍ Social engineering attack
2
What type of attack involves the hacker using a packet sniffer and trying to
view confidential information traveling over the network?
A ❍ Password attack
B ❍ Eavesdrop attack
C ❍ Man-in-the-middle attack
D ❍ Social engineering attack
3
What type of attack involves the hacker causing your system or network to
become unresponsive to valid requests?
A ❍ DoS attack
B ❍ Eavesdrop attack
C ❍ Man-in-the-middle attack
D ❍ Password attack
4
What type of RAID volume duplicates the data fully on two disks?
A ❍ Striped volume
B ❍ Mirrored volume
C ❍ RAID 5 volume
D ❍ RAID Level 0
5
What should you purchase for each laptop to help protect it from theft?
A ❍ Flash drive
B ❍ Driver disk
C ❍ A Doberman Pinscher
D ❍ Lockdown cable
49_487389-bk09ch01.indd 106349_487389-bk09ch01.indd 1063 9/10/09 11:03 PM9/10/09 11:03 PM