IS4560 Hacking and Countermeasures

IS4560 Hacking and Countermeasures

IS4560 Hacking and Countermeasures

ASSESSMENTS







Course Revision Table
Change Date
Updated Section
Change Description
Change Rationale
Implementation Quarter


































Credit hours: 4.5
Contact/Instructional hours: 60 (30 Theory, 30 Lab)
Prerequisite: NT2580 Introduction to Information Security or equivalent
Corequisite: None

MID-TERM EXAMINATION
1. Scope
This exam covers Units 1–5 and is based on the following content from the textbook:
Chapter 1, “Hacking: The Next Generation”
Chapter 2, “TCP/IP Review”
Chapter 3, “Cryptographic Concepts”
Chapter 4, “Physical Security”
Chapter 5, “Footprinting Tools and Techniques”
Chapter 6, “Port Scanning”
Chapter 7, “Enumeration and Computer System Hacking”
Chapter 8, “Wireless Vulnerabilities”
Chapter 9, “Web and Database Attacks”

2. Answer Key: The Mid-Term Examination Answer Key is located in Unit 6 of the Instructor Guide.










MID-TERM EXAM: QUESTIONS
1. Which of the following was the first Internet worm?

a. The Span Network worm
b. The Morris worm
c. Doombot
d. The ARPANET worm

2. A skilled hacker who sometimes acts illegally and sometimes acts with good intent is a ________.

a. white hat
b. black hat
c. grey hat
d. criminal

3. Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.

a. Web site defacement
b. cross-site scripting
c. penetration testing
d. cracking

4. Which law regulates eavesdropping or interception of message contents?

a. The Monitoring and Traffic Act of 1996
b. The Electronic Communications Privacy Act
c. The WPA
d. The Transmitted Communications Act

5. The Sarbanes Oxley Act governs what type of reporting?

a. Newspaper
b. Security
c. Financial
d. Governmental

6. If money is the motivation now, what was the motivation for previous generations of hackers?

a. Money...

Similar Essays