1.
Which of the following is not one of the main components of the security triad?
A. 
B. 
C. 
D. 
2.
Which of the following goals of information security refers to preventing computer or information violations from occurring?
A. 
B. 
C. 
D. 
3.
During which general type of attack does someone who should not be able to get access attempt to get to your resources?
A. 
B. 
Modification and repudiation
C. 
D. 
4.
Which of the following are the most popular spoofing attacks? (Choose two.)
A. 
B. 
C. 
D. 
5.
Which of the following is a remote administration tool used by attackers
to take control of Windows-based systems in a backdoor type of attack?
A. 
B. 
C. 
D. 
6.
What type of software hides certain things from the operating system?
A. 
B. 
C. 
D. 
7.
Which type of virus will change its form in order to avoid detection?
A. 
B. 
C. 
D. 
8.
Which of the following types of viruses modifies and alters other programs and databases?
A. 
B. 
C. 
D. 
9.
Which of the following goals of information security refers to
developing strategies and techniques to deal with an attack or loss?
A. 
B. 
C. 
D. 
10.
Which of the following access attacks amounts to someone routinely monitoring network traffic?
A. 
B. 
C. 
D. 
11.
During which general type of attack does someone want to modify information in your system?
A. 
B. 
Modification and repudiation
C. 
D. 
12.
Which type of virus attacks a system in multiple ways?
A. 
B. 
C. 
D. 
13.
Which of the following is a type of spyware that is often used to generate unwanted/unsolicited pop-up advertisements?
A. 
B. 
C. 
D. 
14.
Which of the following authentication protocols employs certificates
that contain rights and access privileges of a bearer as part of its
payload?
A. 
B. 
C. 
D. 
15.
Which of the following is a type of virus disguised as or within screen savers?
A. 
B. 
C. 
D. 
16.
Which type of virus often attacks the antivirus software installed on a computer?
A. 
B. 
C. 
D. 
17.
Which type of virus avoids detection by making itself indistinguishable from other applications?
A. 
B. 
C. 
D. 
18.
What type of software acts on behalf of a third party and collects information?
A. 
B. 
C. 
D. 
19.
Which of the following is a device that looks for open ports on a server?
A. 
B. 
C. 
D. 
20.
Which of the following access attacks amounts to someone placing a
computer between the sender and the receiver to capture information
while it's sent?
A. 
B. 
C. 
D. 
21.
Which of the following is a remote administration tool used by attackers
to take control of Windows-based systems in a backdoor type of attack?
A. 
B. 
C. 
D. 
22.
Which of the following are popular examples of denial-of-service attacks? (Choose all that apply.)
A. 
B. 
C. 
D. 
23.
Which of the following is another name for active sniffing?
A. 
B. 
C. 
D. 
24.
During which general type of attack does someone try to disrupt your network and services?
A. 
B. 
Modification and repudiation
C. 
D. 
25.
Which of the following goals of information security refers to identifying events when they occur?
A. 
B. 
C. 
D.