Datasheet

Fundamentals of Security
Prep Test
1
What type of attack involves the hacker tricking a user through social contact?
A Password attack
B Eavesdrop attack
C Man-in-the-middle attack
D Social engineering attack
2
What type of attack involves the hacker using a packet sniffer and trying to
view confidential information traveling over the network?
A Password attack
B Eavesdrop attack
C Man-in-the-middle attack
D Social engineering attack
3
What type of attack involves the hacker causing your system or network to
become unresponsive to valid requests?
A DoS attack
B Eavesdrop attack
C Man-in-the-middle attack
D Password attack
4
What type of RAID volume duplicates the data fully on two disks?
A Striped volume
B Mirrored volume
C RAID 5 volume
D RAID Level 0
5
What should you purchase for each laptop to help protect it from theft?
A Flash drive
B Driver disk
C A Doberman Pinscher
D Lockdown cable
49_487389-bk09ch01.indd 106349_487389-bk09ch01.indd 1063 9/10/09 11:03 PM9/10/09 11:03 PM