71. You start with a simple question for Ian. You ask him which category of threat a computer virus falls
under. He replies: ____.
a. necessity c. secrecy
b. integrity d. ephemeral
ANS: B PTS: 1 REF: WEB 327 TOP: Critical Thinking
72. Next, you ask Ian what category of threat encryption is meant to tackle, and which encryption method
works best on the Internet. He replies: ____ and ____.
a. necessity; symmetrical c. secrecy; symmetrical
b. integrity; asymmetrical d. necessity; symmetrical
ANS: C PTS: 1 REF: WEB 301 TOP: Critical Thinking
73. Impressed with Ian’s knowledge, you decide to test him further. You ask him what kind of software
tool or program is most helpful in defending against necessity attacks. He replies: ____.
a. packet sniffer c. ad blocker
b. script kiddie d. secret key
ANS: A PTS: 1 REF: WEB 311 TOP: Critical Thinking
74. Moving on, you ask Ian what type of computers commonly participate in a DDoS attacks. He answers
____.
a. zombies c. both a. and b.
b. bots d. neither a. nor b.
ANS: C PTS: 1 REF: WEB 310 TOP: Critical Thinking
75. Lastly, you ask Ian what it is about a digital sound or video file that permits steganography. Again, he
correctly responds that ____.
a. an individual sound or video file is usually broken up into many pieces on a hard drive
b. the steganographic mark can be seen or heard by other users as a means of free and fast
advertising
c. sound and video files contain portions of unused data where secret messages can be
hidden
d. none of the above
ANS: C PTS: 1 REF: WEB 309 TOP: Critical Thinking
Case-Based Critical Thinking Questions
Case 6-2
Heather’s friend recently had her identity stolen after accidentally responding to a phishing email.
Worried that it might happen to her, Heather has read up on how phishing attacks work. You come
over to help make sure she understands it.
76. You tell Heather, hypothetically, that an email was sent to her asking her to click the following URL
link: https://www.chase.com/customer/
[email protected]/index.html. You ask her where this link
will take her. She replies: ____.
a. to the www.chase.com Web site, in the customer/private folder
b. to the www.chase.com main page
c. to the home page of a Web site with the URL 218.36.41.188
d. none of the above
ANS: C PTS: 1 REF: WEB 305 TOP: Critical Thinking