Preview

ARTICLE SUMMARY

Powerful Essays
Open Document
Open Document
1028 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ARTICLE SUMMARY
test3

True/False
Indicate whether the statement is true or false.

_T_ 1. An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.

__T__ 2. Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

__F__ 3. To retrieve e-mail from a mail server, you most likely access port 119.

__T__ 4. An octal digit can be represented with only three bits because the largest digit in octal is seven.

__F__ 5. A hex number is written with two characters, each representing a byte.

__F_ 6. Macro viruses are hard to create.

__T__ 7. Computer crime is the fastest growing type of crime worldwide.

__T__ 8. To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.

_F___ 9. The HTTP CONNECT method starts a remote application-layer loopback of the request message.

_F___ 10. A NetBIOS name does not need to be unique on a network.

Multiple Choice
Identify the choice that best completes the statement or answers the question.

__C__ 11. ____ takes penetration testing to a higher level.
a.
Hacking
c.
Security testing
b.
Cracking
d.
Packet sniffing

__A__ 12. Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.
a.
script kiddies
c.
packet sniffers
b.
repetition monkeys
d.
crackers

__D__ 13. The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called ____.
a.
CompTIA Security+
b.
OSSTMM Professional Security Tester (OPST)
c.
Certified Information Systems Security Professional (CISSP)
d.
Certified Ethical Hacker (CEH)

__A__ 14. The SysAdmin,Audit,Network,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    2. Who is the computer ethicist that defines computer hacker as an individual working with computers who was technically gifted and skilled?…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Paper Summary

    • 414 Words
    • 2 Pages

    The essay “Newfoundlandese,If you please” written by Diane Mooney showing how English, British and French of Newfoundland evolved into many variations and the impact on their speech. Mooney identifies herself as an individual from an Irish settlement. The essay begins with Mooney’s travel experience to Port au Port peninsula on the west coast where the French descendants inhabits. In the second paragraphs, Mooney is presenting hers self as someone familiar with the Avalon Peninsula. The author discusses the Irish communities living in the Southern shore of the island and their dialects. Mooney points out that majority of Irish in the Southern shore are Catholics whereas Irish in the Trinity-Conception are Anglican. Mooney then moves on to discuss the Central Newfoundland which are logging and mining towns and their dialects. The author discusses the uniqueness of this settlement and presenting this settlement as someone who got mixed dialects. Finally, the author moves on to discuss dialects of the people living in Northern Peninsula which is very large and not heavily populated. The author concludes Newfoundland as a province with many difference descendants with different dialects.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Article Summary

    • 660 Words
    • 2 Pages

    In the article "Understanding American Worldview," the author J. LaVelle Ingram explains the cross cultural differences between Americans and immigrants. It also informs immigrants the atypical worldview of the American country they are adopting. Hence, these set of worldviews are categorized in five dimensions.…

    • 660 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The CISSP certification is meant for someone who has “gained satisfactory knowledge of the material in the ISC2 CBK as well as 5 years of actual security work experience (ISC2).” The CISSP certification is very useful to an established security veteran however, an Associate of (ISC)² which is for a student or a person who is considering a career change and possibly contemplating entering the field of information security. The CISSP certification represents to a future employer that the applicant knows what they are doing and has obtained enough work experience to satisfy the CISSP requirement. Consensus has it that the CISSP material and exam has become stagnant and requires little in the form of actual hands on knowledge, and has been referred…

    • 400 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Article Summary

    • 499 Words
    • 2 Pages

    Summary of Read-only participants a case for student communication in online classes By Shakera Bennett Grand Canyon University UNV 501-Intro to Graduate Studies in the College of Education September 12, 2012 Carrie ODonnell, Instructor Learning communities are no longer limited to the classroom. Online classes are becoming more prevalent in this day and age. As these online classes grow in abundance, the issues that affect the traditional classroom are now issues that occur in online communities. In the article, Read-only participants a case for student communication in online classes, authors Nagel, Blignaut, and Cronj (2009) tackle reasons why participation is an underlying cause for successful class completion. With the use of a learning management system (LMS), students activity in their online classroom can be traced. It is easy to detect students who are lurking and not participating opposed to students who are actively engaged. The LMS also tracks a students progress and performance in a class where community needs to be built in order to lead the way to active participation. As an active participant, the authors prove that students have a better average than Read-only participant (ROP) students. Their interactions promote understanding and enable them to have a collaborative learning environment. The authors states that these active learners develop critical thinking skills and a great retention for learning. Being an active participant also informs the instructor (who is also an active part of the classroom) of any misconceptions or difficulties that the student may have. Read Only Participation students, however, face different outcomes. Some feel that by doing the basics their needs are met and they are satisfied whereas other factors come into play. The authors suggest that some ROPers are procrastinators, not technically savvy (or tech savvy with bandwidth issues), and/or feel isolated and miss classroom structure.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Certifications will help the holders secure pay increases and career advancements. Earning a certification demonstrates competency in the target subject matter and shows that the holder is dedicated to their career. The two most popular certifications are the GIAC Security Expert (GSE) and the Certified Information Systems Security Professional (CISSP). Cisco offers their Cybersecurity Specialist (CS) certification, but major universities also offer graduate level professional certifications.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Law Contd

    • 2531 Words
    • 11 Pages

    The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used.…

    • 2531 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Introduction of ECDL/ICDL

    • 448 Words
    • 2 Pages

    ICDL certificate is an accredited standard of competence for computer users by the ECDL foundation.…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Suppose a machine has 20GB of storage space available on a hard disk and receives data over a…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The hacker is one type of computer user, they spend most of their time electronically breaking into other computer’s. The word hacker is synonymous with internet crimes, however hackers are highly intelligent individuals with a vast knowledge of computers. They spend their time trying to break through security systems of various networks connected to the internet. Hackers are infamous for infiltrating CIA databases, credit card companies, or more recently the PlayStation Network and wreaking havoc. These people stay up for hours looking for codes and passwords for various systems on the internet in the hopes of obtaining some sort of valuable information. There are many websites and forums dedicated to this past time which educates the general public as well as new hackers to their game. They know how the computers operate and are usually very familiar with programming languages, so they can create their own programs to break passwords. Half of the time…

    • 1162 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    negative aspects

    • 254 Words
    • 2 Pages

    a. What is the term given to the act of downloading software illegally from the Internet or copying software without permission?…

    • 254 Words
    • 2 Pages
    Satisfactory Essays