Take Test: Vulnerability Scanning, Ethics, Privacy, and The ...

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Take Test: Vulnerability scanning, ethics, privacy, and the ...

5/31/20, 19:34

Suman Shah 11
Home Library My Account Help

?
COMP623 - Digital Security - 14818 - WIN - 201910 Quizzes
Take Test: Vulnerability scanning, ethics, privacy, and the Web

Take Test: Vulnerability scanning, ethics, privacy, and the Web

Test Information
Description
Instructions
Timed Test This test has a time limit of 40 minutes.This test will save and be submitted
automatically when the time expires.
Warnings appear when half the time, 5 minutes, 1 minute, and 30 seconds
remain.
Multiple This Test allows 2 attempts. This is attempt number 1.
Attempts
Force Once started, this test must be completed in one sitting. Do not leave the test
Completion before clicking Save and Submit.
Your answers are saved automatically.

QUESTION 1 1 points Saved

OpenVAS is a fork of which project?

Nessus

Nexpose

Nmap

https://my.leedsbeckett.ac.uk/webapps/assessment/take/launch.jsp?…t_id=_27645_1&course_id=_128277_1&content_id=_2700504_1&step=null Page 1 of 4
Take Test: Vulnerability scanning, ethics, privacy, and the ... 5/31/20, 19:34

MSF

QUESTION 2 1 points Saved

A vulnerability scan will never crash the system being scanned


True
False

QUESTION 3 1 points Saved

Which of the following tools includes scripts for performing


vulnerability analysis scans?

Msfconsole

Dig

Amap

Nmap

QUESTION 4 1 points Saved

Which of the following is NOT an advantage of vulnerability


scanning vs penetration testing

Systematic and consistent results

Less likely to cause accidental damage

Automated and easy to conduct

Thorough and complete

QUESTION 5 1 points Saved

Which of the following would NOT be conducted during a


typical vulnerability scan?

Probe the system(s), to determine status and con!guration


of services

https://my.leedsbeckett.ac.uk/webapps/assessment/take/launch.jsp?…_id=_27645_1&course_id=_128277_1&content_id=_2700504_1&step=null Page 2 of 4
Take Test: Vulnerability scanning, ethics, privacy, and the ... 5/31/20, 19:34

Port scans

Exploit vulnerabilities

Service identi!cation on each open port

QUESTION 6 1 points Saved

Which of the following rights are related to the right to privacy?

All of these

Freedom of association

Freedom of thought

Freedom of expression

QUESTION 7 1 points Saved

Con!dentiality is:

That information is only modi!ed in authorised ways

Privacy

A security goal / state

A right

QUESTION 8 1 points Saved

Alice breaks into a botnet while conducting research, and !nds


that the botnet is causing harm to others by collecting credit
card numbers, mining Bitcoin (using CPU/power), and
intercepting and modifying bank transactions. She is faced with
the decision: does she shutdown a large number of zombies on
Remaining Time: 18 minutes, 22 seconds.
the botnet, thereby protecting thousands of people, or does
she continue to study the botnet to try to !nd a way to
permanently stop it.
Question Completion Status:
Deciding to shutdown the zombies would be an example of
what kind of ethical reasoning?

Utilitarianism

Consequentialism

https://my.leedsbeckett.ac.uk/webapps/assessment/take/launch.jsp?…_id=_27645_1&course_id=_128277_1&content_id=_2700504_1&step=null Page 3 of 4
Take Test: Vulnerability scanning, ethics, privacy, and the ... 5/31/20, 19:34

Egoism

Altruism

QUESTION 9 1 points Saved

Bob discovers a new software vulnerability, and he decides to


release the exploit code publicly without notifying the software
authors. He believes that it is the best way to get the authors to
!x the problem fastest.
This is an example of what type of ethical reasoning?

Deontology

Ethical altruism

Consequentialism

Virtue Ethics

QUESTION 10 1 points Saved

Local Web proxies such as Burp Suite or WebScarab are


primarily used for:

Testing a website for security problems, by intercepting


requests between a remote victim and a server

Testing a website for security problems, by intercepting


requests between an attacker and a server

Hiding the identity of the attacker

Pivoting between compromised servers

Click Save and Submit to save and submit. Click Save All Answers to save all answers.

Save All Answers Save and Submit

https://my.leedsbeckett.ac.uk/webapps/assessment/take/launch.jsp?…_id=_27645_1&course_id=_128277_1&content_id=_2700504_1&step=null Page 4 of 4

You might also like