Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.
A. URL Manipulation
B. XSS Attack
C. SQL Injection
D. Denial of Service Attack
In a qualitative risk analysis, risk is calculated in terms of:
A. (Attack Success + Criticality ) ?Countermeasures)
B. Asset criticality assessment ?(Risks and Associated Risk Levels)
C. Probability of Loss X Loss
D. (Countermeasures + Magnitude of Impact) ?(Reports from prior risk assessments)
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate action
D. The message prompts the user to install Anti-Virus
An adversary attacks the information resources to gain undue advantage is called:
A. Defensive Information Warfare
B. Offensive Information Warfare
C. Electronic Warfare
D. Conventional Warfare
Changing the web server contents, Accessing the workstation using a false ID and Copying sensitive data without authorization are examples of:
A. DDoS attacks
B. Unauthorized access attacks
C. Malware attacks
D. Social Engineering attacks
To respond to DDoS attacks; one of the following strategies can be used:
A. Using additional capacity to absorb attack
B. Identifying none critical services and stopping them
C. Shut down some services until the attack has subsided
D. All the above
A malware code that infects computer files, corrupts or deletes the data in them and requires a host file to propagate is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
The Malicious code that is installed on the computer without user's knowledge to acquire information from the user's machine and send it to the attacker who can access it remotely is called:
A. Spyware
B. Logic Bomb
C. Trojan
D. Worm
What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the established connections on it:
A. "arp" command
B. "netstat 璦n" command
C. "dd" command
D. "ifconfig" command
Business Continuity provides a planning methodology that allows continuity in business operations:
A. Before and after a disaster
B. Before a disaster
C. Before, during and after a disaster
D. During and after a disaster