CMGT 400 Week 1 Test QUIZ

Jul 28th, 2016
Studypool Tutor
Price: $15 USD

Tutor description

1. Which of the following is generally viewed as the first Internet worm to have caused significant damage and to have “brought the Internet down”? A. Melissa B. The “Love Bug” C. The Morris worm D. Code Red 2. Which of the following individuals was convicted of various computer crimes and was known for his ability to conduct successful social engineering attacks? A. Kevin Mitnick B. Vladimir Levin C. Timothy Lloyd D. David Smith 3. Which virus/worm was credited with reaching global proportions in less than ten minutes? A. Code Red B. The Morris worm C. Melissa D. Slammer 4. An attacker who feels that using animals to make fur coats is unethical and thus defaces the web site of a company that sells fur coats is an example of: A. Information warfare B. Hacktivisim C. Cyber crusading D. Elite hacking 5. What is the most common form of authentication used? A. Smart card B. Tokens C. Username/password D. Retinal scan 6. The Components of CIA triangle are A. Corpor

Word Count: 978
Showing Page: 1/4
CMGT 400 Week 1 Test QUIZ1. Which of the following is generally viewed as the first Internet worm to have causedsignificant damage and to have brought the Internet down?A. MelissaB. The Love BugC. The Morris wormD. Code Red2. Which of the following individuals was convicted of various computer crimes and was knownfor his ability to conduct successful social engineering attacks?A. Kevin MitnickB. Vladimir LevinC. Timothy LloydD. David Smith3. Which virus/worm was credited with reaching global proportions in less than ten minutes?A. Code RedB. The Morris wormC. MelissaD. Slammer4. An attacker who feels that using animals to make fur coats is unethical and thus defaces theweb site of a company that sells fur coats is an example of:A. Information warfareB. HacktivisimC. Cyber crusadingD. Elite hacking5. What is the most common form of authentication used?A. Smart cardB. TokensC. Username/passwordD. Retinal scan6. The Components of CIA triangle areA. Corporate secrecy, Integrity, and AvailabilityB. Confidentiality, Integrity, and AccessC. Confidentiality, Integrity, and AvailabilityD. Confidentiality, Information Security, and Availability7.

Review from student

Studypool Student
" Outstanding Job!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1831 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors