Preview

ARTICLE SUMMARY

Powerful Essays
Open Document
Open Document
1028 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ARTICLE SUMMARY
test3

True/False
Indicate whether the statement is true or false.

_T_ 1. An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.

__T__ 2. Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

__F__ 3. To retrieve e-mail from a mail server, you most likely access port 119.

__T__ 4. An octal digit can be represented with only three bits because the largest digit in octal is seven.

__F__ 5. A hex number is written with two characters, each representing a byte.

__F_ 6. Macro viruses are hard to create.

__T__ 7. Computer crime is the fastest growing type of crime worldwide.

__T__ 8. To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.

_F___ 9. The HTTP CONNECT method starts a remote application-layer loopback of the request message.

_F___ 10. A NetBIOS name does not need to be unique on a network.

Multiple Choice
Identify the choice that best completes the statement or answers the question.

__C__ 11. ____ takes penetration testing to a higher level.
a.
Hacking
c.
Security testing
b.
Cracking
d.
Packet sniffing

__A__ 12. Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.
a.
script kiddies
c.
packet sniffers
b.
repetition monkeys
d.
crackers

__D__ 13. The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called ____.
a.
CompTIA Security+
b.
OSSTMM Professional Security Tester (OPST)
c.
Certified Information Systems Security Professional (CISSP)
d.
Certified Ethical Hacker (CEH)

__A__ 14. The SysAdmin,Audit,Network,

You May Also Find These Documents Helpful

  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Article Summary

    • 335 Words
    • 1 Page

    In this article, the author, Debra Barrow, talks about how customer service has changed from the good old days of full service gas stations and face to face communication to todays self-serve, pre-recorded society. Customers back then were fiercely loyal to your business when you gave them good service in virtually any type of businesses. She examines if the downturn in the economy has something to do with the lowering of the level of customer service or if it has just been happening for a while.…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The CISSP certification is meant for someone who has “gained satisfactory knowledge of the material in the ISC2 CBK as well as 5 years of actual security work experience (ISC2).” The CISSP certification is very useful to an established security veteran however, an Associate of (ISC)² which is for a student or a person who is considering a career change and possibly contemplating entering the field of information security. The CISSP certification represents to a future employer that the applicant knows what they are doing and has obtained enough work experience to satisfy the CISSP requirement. Consensus has it that the CISSP material and exam has become stagnant and requires little in the form of actual hands on knowledge, and has been referred…

    • 400 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Certifications will help the holders secure pay increases and career advancements. Earning a certification demonstrates competency in the target subject matter and shows that the holder is dedicated to their career. The two most popular certifications are the GIAC Security Expert (GSE) and the Certified Information Systems Security Professional (CISSP). Cisco offers their Cybersecurity Specialist (CS) certification, but major universities also offer graduate level professional certifications.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    article summary

    • 417 Words
    • 2 Pages

    The chemical that spilled into the waters in West Virginia is called methyl cyclohexane methanol or MCHM for short. The chemical is used to clean coal and helps separate the burnable fossil fuel from the unburnable rock and dirt and other contaminations. Because of the spill, 300,000 people can’t drink, cook, shower, or do anything involving water and it touching your body. The people of West Virginia have been living off bottled water for everything they do. The schools were closed along with some work offices. It has been said that MCMH should not be swallowed and may readily cause skin and eye irritation but it is not known to pose major risks to human health and safety. Some of the West Virginia citizens stated it smelled like a type of licorice. MCMH can burn but only when concentrated and at relatively high temperatures above 112 degrees Celsius, but it is not explosive or corrosive. "We may not have the information to know whether it's really safe for the general population," including children, the elderly, the sick or pregnant women, says chemist Richard Sachleben, who works in pharmaceutical research and development. He adds that shutting everything down was the best possible thing to do. This substance is the safest of the others and is also far less dangerous than some other industrial solvents (PCBs for example), byproducts (such as dioxin) and other liquid industrial spills (fly ash slurries). Americans are exposed to more industrial chemicals every day that pose far more risk. Scientist Halden states that the spill is similar to a gasoline spill and that it shouldn’t be a long term concern to citizens.…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    summary

    • 269 Words
    • 2 Pages

    Sex, Lies and Conversation: Why Is It So Hard for Men and Women to Talk to Each Other…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Article Summary

    • 499 Words
    • 2 Pages

    Summary of Read-only participants a case for student communication in online classes By Shakera Bennett Grand Canyon University UNV 501-Intro to Graduate Studies in the College of Education September 12, 2012 Carrie ODonnell, Instructor Learning communities are no longer limited to the classroom. Online classes are becoming more prevalent in this day and age. As these online classes grow in abundance, the issues that affect the traditional classroom are now issues that occur in online communities. In the article, Read-only participants a case for student communication in online classes, authors Nagel, Blignaut, and Cronj (2009) tackle reasons why participation is an underlying cause for successful class completion. With the use of a learning management system (LMS), students activity in their online classroom can be traced. It is easy to detect students who are lurking and not participating opposed to students who are actively engaged. The LMS also tracks a students progress and performance in a class where community needs to be built in order to lead the way to active participation. As an active participant, the authors prove that students have a better average than Read-only participant (ROP) students. Their interactions promote understanding and enable them to have a collaborative learning environment. The authors states that these active learners develop critical thinking skills and a great retention for learning. Being an active participant also informs the instructor (who is also an active part of the classroom) of any misconceptions or difficulties that the student may have. Read Only Participation students, however, face different outcomes. Some feel that by doing the basics their needs are met and they are satisfied whereas other factors come into play. The authors suggest that some ROPers are procrastinators, not technically savvy (or tech savvy with bandwidth issues), and/or feel isolated and miss classroom structure.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Law Contd

    • 2531 Words
    • 11 Pages

    The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used.…

    • 2531 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Introduction of ECDL/ICDL

    • 448 Words
    • 2 Pages

    ICDL certificate is an accredited standard of competence for computer users by the ECDL foundation.…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Suppose a machine has 20GB of storage space available on a hard disk and receives data over a…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The hacker is one type of computer user, they spend most of their time electronically breaking into other computer’s. The word hacker is synonymous with internet crimes, however hackers are highly intelligent individuals with a vast knowledge of computers. They spend their time trying to break through security systems of various networks connected to the internet. Hackers are infamous for infiltrating CIA databases, credit card companies, or more recently the PlayStation Network and wreaking havoc. These people stay up for hours looking for codes and passwords for various systems on the internet in the hopes of obtaining some sort of valuable information. There are many websites and forums dedicated to this past time which educates the general public as well as new hackers to their game. They know how the computers operate and are usually very familiar with programming languages, so they can create their own programs to break passwords. Half of the time…

    • 1162 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    negative aspects

    • 254 Words
    • 2 Pages

    a. What is the term given to the act of downloading software illegally from the Internet or copying software without permission?…

    • 254 Words
    • 2 Pages
    Satisfactory Essays