Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

ASSIGNMENT NO.

1
CDI 402

Student’s Name:
Year/ Section:
Instructor:
School:

INSTRUCTIONS:

I. PRAY.
II. DO NOT CHEAT.
III. BE HONORABLE BY BEING HONEST.
IV. WRITE YOUR ANSWERS IN YOUR QUIZ NOTEBOOK.
V. ANSWER DIRECTLY
VI. USE BLACK BALLPOINT PEN.
VII. YOUR HANDWRITING SHOULD BE CURSIVE.
VIII. REVIEW YOUR ANSWERS BEFORE SUBMITTING YOUR PAPERS.
IX. TAKE A PICTURE OF YOUR ANSWER SHEET AND UPLOAD IT IN OUR
FUEL.

PART I.

1. What is a denial of service attack?


2. How do denial of service attacks work?
3. How can organizations protect themselves against denial of service
attacks?
4. What is a rogue Wi-Fi hotspot?
5. How can users protect themselves from rogue Wi-Fi hotspots?
6. What are the risks of connecting to a rogue Wi-Fi hotspot?
7. What is identity theft?
8. How do criminals obtain personal information for identity theft?
9. What are some steps individuals can take to protect themselves
from identity theft?
10. What is a rootkit?
11. How do rootkits gain access to a computer system?
12. What are some signs that a computer may be infected with a
rootkit?
PART II.

1. What is the primary goal of a denial of service attack?


a) To steal sensitive data
b) To disable a computer system or network
c) To spread malware
d) To hijack a user's identity

2. Which of the following is a common type of denial of service attack?


a) Phishing attack
b) SQL injection attack
c) Distributed denial of service (DDoS) attack
d) Cross-site scripting (XSS) attack

3. Which of the following is a way to mitigate the impact of a denial of


service attack?
a) Shutting down the targeted system or network
b) Paying a ransom to the attacker
c) Implementing content delivery networks (CDNs)
d) Ignoring the attack and hoping it will go away

4. What is the primary goal of a rogue Wi-Fi hotspot?


a) To provide free internet access to users
b) To steal sensitive information from unsuspecting users
c) To improve internet speed and connectivity
d) To spread malware to connected devices

5. How can users identify a rogue Wi-Fi hotspot?


a) By looking for a generic network name like "Free Wi-Fi"
b) By checking the signal strength of the Wi-Fi network
c) By asking the network owner for the Wi-Fi password
d) By searching for the Wi-Fi network on a trusted website

6. Which of the following can protect users from a rogue Wi-Fi hotspot?
a) Using a virtual private network (VPN)
b) Connecting to any available Wi-Fi network
c) Disabling the Wi-Fi feature on their device
d) Sharing personal information with the Wi-Fi network owner

7. Which of the following is an example of identity theft?


a) Forging a signature on a check
b) Shoplifting from a store
c) Stealing a car
d) Using someone else's credit card without their permission
8. How can individuals protect themselves from identity theft when using
their credit cards online?
a) Avoid using credit cards online
b) Use a public Wi-Fi network when making online purchases
c) Only make purchases from trusted websites
d) Share credit card information with friends and family

9. What is the purpose of a credit freeze in regards to identity theft?


a) To prevent new credit accounts from being opened in an individual's
name
b) To freeze an individual's bank account in case of fraud
c) To cancel any existing credit accounts in an individual's name
d) To monitor an individual's credit report for suspicious activity

10. What is the primary goal of a rootkit?


a) To delete files and data from a computer system
b) To cause system crashes and disrupt normal operations
c) To hide the existence of malware or unauthorized access
d) To spread malware to other computer systems

11. How can a rootkit gain access to a computer system?


a) By exploiting vulnerabilities in software or operating systems
b) By physically stealing the computer
c) By sending an email with a malicious attachment
d) By clicking on a suspicious link on a website

12. How can individuals protect their computer systems from rootkits?
a) By avoiding using the internet altogether
b) By regularly updating antivirus software
c) By sharing their passwords with friends and family
d) By downloading software from untrusted sources

----------------------------------------------END------------------------------------

You might also like