Network Security

  1. Multiple choice questions:

 

  1. Which of the following is not an external threat to a computer or a computer network

(a) Ignorance

(b) Trojan horses

(c) Adware

(d) Crackers

(a) Ignorance

 

  1. When a person is harassed repeatedly by being followed, called or be written to he / she is a target of

(a) Bullying

(b) Identity theft

(c) Stalking

(d) Phishing

(c) Stalking

 

  1. With genetic and genomic research which of the following issues is of specific concern

(a) Anonymity

(b) Intellectual property

(c) Software piracy

(d) Concerns about biochip implants

(a) Anonymity

 

 

 

  1. Which of the following is a class of computer threat

(a) Phishing

(b) DoS attacks

(c) Soliciting

(d) Stalking

(b) DoS attacks

 

  1. A license allows a user to use copyrighted material.

(a) True

(b) False

(a) True

 

  1. It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.

(a) Anti virus

(b) Firewall

(c) Cookies

(d) Cyber safety

(b) Firewall

 

  1. It allow a visited website to store its own information about a user on the user’s computer.?

(a) Spam

(b) Malware

(c) Cookies

(d) Adware

(c) Cookies

 

  1. It is stealing ideas or creations of others.

(a) Plagiarism

(b) Piracy

(c) Intellectual Property Rights

(d) All of the above

(c) Intellectual Property Rights

 

  1. Hacking a computer is always illegal and punishable by law.

(a) True

(b) False

(b) False

 

  1. Exploring appropriate and ethical behaviors related to online environments and digital media.

(a) Cyber ethics

(b) Cyber safety

(c) Cyber security

(d) Cyber law

(a) Cyber ethics

 

  1. A license allows a user to use copyrighted material.

(a) In some situations this statement is correct

(b) This statement is not true at all.

(c) In is not necessary to use license.

(d) All the above statements are not applicable.

(a) In some situations this statement is correct

 

  1. Answer the following questions:

 

  1. Differentiate between a workstation license and a site license.

Answer: Workstation licenses are licenses that permit the installation of an application on a single computer. Before installing it on a different machine the software must be removed from the first machine.

Site licenses permit the use of software on any computer at a specified site. Unlimited site licenses allow the installation of the software on any number of computers as long as those computers are located at the specified site.

  1. Write a short note on your understanding of ‘cracking’ a software.

Answer: Cracking a software usually mean to harm the software, the hardware using this software or the end user of the software. These works are done by Crackers who modify or disable features of a software application.

  1. What are the categories of Cyber crime. Explain them.

Answer: Categories of Cyber crimes are:

  1. General Intrusions: It includes Hacking, spyware, phishing, pharming, Sending computer viruses & worms to invade computers. Causing denial of service attacks. Creating bots, Trojan horses, zombie machines.
  2. Nuisances (usually non-violent activities): Sending spam, Changing web page text and images, Redirecting websites.
  3. Personal Identity Theft (using someone else’s name or credit): Phishing for private information, passwords, code numbers, Making unauthorized purchases with stolen credit cards or ID, Destroying personal reputation, Damaging personal credit ratings.
  4. Theft of Intellectual Property (stealing ideas or creations of others): Downloading copyrighted music & videos, Plagiarism, cheating, Software piracy.
  5. Physical or Mental Damage: Cyber bullying, harassment, Cybers talking, Sexual exploitation of minors, child pornography.
  6. Terrorism: Stealing military and private industry secrets – espionage, Brainwashing and recruiting new followers, Building terrorist communications network.

 

 

  1. Define the following terms:

(a) Spyware: Spyware is simply software that literally spies on what is being done on a computer.

(b) Malware: Malware is used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

(c) Virus: A computer virus is a program that replicates itself. A computer virus attaches itself to a program or file to help it spread from one computer to another.

(d) Worms: A worm is similar to a virus and is considered to be a sub-class of a virus. It spreads from computer to computer, as it has the capability to travel without any human action.

  1. Read about ethical hacking and write a short note on your understanding of the topic.

Answer: Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. This act is performed by computer and network expert known as Ethical hacker. An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. Ethical hacking is also known as penetration testing, intrusion testing and red teaming. First examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems.

  1. Why cyber security should be taken care by the user while working on internet?

Answer: To remain safe from dramatic virus attacks, hackers, and other interesting Internet phenomena cyber security should be taken care by the user while working on internet.

  1. Discuss all the point which should be kept in mind while working on computers.

Answer: We should follow below point while working on computers:

  1. Set secure passwords and don’t share them with anyone. Avoid using common words, phrases, or personal information and update regularly.
  2. Restrict access and make personal information secure to prevent identity theft.
  3. Be suspicious of unsolicited contact from individuals seeking internal organizational data or personal information.
  4. Limit the amount of personal information you post. Do not post information that would make you vulnerable, such as your address or information about your schedule or routine.
  5. Take advantage of privacy and security settings. Use site settings to limit the information you share with the general public online.
  6. Be suspicious of unknown links or requests sent through email or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.
  7. Download only trusted applications from reputable sources or marketplaces.
  8. What is Denial of Service attack? How it affects the systems performance?

Answer: Denial of service (dos) attacks that are designed to prevent legitimate access to a system.

It affect system by web attacks that attempts to breach a website. Two of the most common such attacks are SQL injection and cross-site scripting.

  1. What is the difference between Shareware and Freeware software’s?

Answer: Shareware are copyrighted software that can be shared for a limited on a trial basis with

the understanding that if the user decides to use it, he will pay for it.

Freeware software is made available for use, free of charge for an unlimited time. The copyright still remains with the producer / owner for any future development.