Free IC3-3 Exam Braindumps (page: 5)

Page 4 of 36

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windows- based network. You are incharge of the data and network security of the company.
While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data.
What type of threat is this?

  1. Malware
  2. External threat
  3. Internal threat
  4. Zombie

Answer(s): C

Explanation:

This type of threat is known as internal threat. The difference between internal and external threats is as follows:Internal Threat: Internal threats originate from within an organization. These threats come from the employees and others having legal access. For example, a database administrator who has full access rights can easily steal the data. External Threat: External threats originate from outside an organization. These are the threats intended to flood a network with large volumes of access requests. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.
Answer option B is incorrect. External threats originate from outside of an organization, not from within the organization.
Answer option D is incorrect.
A zombie is malicious software that secretly takes over another computer connected to the Internet. The zombie's creator uses the same computer to launch attacks that are difficult to detect.Zombies are used in denial-of-service attacks. The attacker plants a zombie in hundreds of computers belonging to unsuspecting third parties, and then uses these computers against targeted websites. These computers are also called zombie computers. Zombies are also used to commit click fraud against sites displaying pay per click advertising. Others can host phishing or money mule recruiting websites.
Answer option A is incorrect. Malware is a combination of the terms malicious and software. It refers to a variety of hostile programs, such as a virus or a Trojan horse, designed to damage or disrupt a computer. It gathers information about a computer without the user's permission or knowledge.



Which of the following Web sites is used by the users to browse various products and to make purchases?

  1. Micro-site
  2. Internet forum
  3. Social networking site
  4. E-commerce site

Answer(s): D

Explanation:

Electronic commerce, commonly known as e-commerce or eCommerce, or e-business consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with widespread Internet usage. E-commerce sites can be used by users to browse various products and to make purchases. Amazon.com is an example of an e-commerce site.
Answer option A is incorrect.
A micro-site, also known as a mini site or weblet, is an Internet web design term referring to an individual web page or cluster of pages which are meant to function as an auxiliary supplement to a primary website. The micro-site's main landing page most likely has its own domain name or sub- domain. They are typically used to add a specialized group of information either editorial or commercial. Such sites may be linked in to a main site or not or taken completely off a site's server when the site is used for a temporary purpose. The main distinction of a micro-site versus its parent site is its purpose and specific cohesiveness as compared to the micro-site's broader overall parent website.Micro-sites used for editorial purposes may be a page or group of pages that, for example, may contain information about a holiday, an event or similar item which gives more detailed information than a site's general content area may provide.
A community organization may have its main site with all of the organization's basic information, but creates a separate, temporary micro- site to inform about a particular activity, event, or similar.
Answer option B is incorrect. An Internet forum, or message board, is an online discussion site. It originated as the modern equivalent of a traditional bulletin board, and a technological evolution of the dialup bulletin board system. From a technological standpoint, forums or boards are web applications managing user-generated content. People participating in an Internet forum may cultivate social bonds and interest groups for a topic made from the discussions.
Answer option C is incorrect. Social networking Web sites provide a virtual community in which people with a shared interest may communicate. These sites provide users the ability to create their profile page. The users can post their thoughts, ideas, and anything else and can share it with their friends. Some popular social networking sites are MySpace, Twitter, and Facebook.



Identify the BNC connector in the image.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



BNC stands for British Naval Connector. It is a connector used to connect 10Base2 cable network to Network Interface Card (NIC).



Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like Lumca and Cloud Up under its brand name Mola and uses green and red logo.
Which of the following violations has been committed by Mola Co.?

  1. Copyright infringement
  2. Trademark infringement
  3. Patent law
  4. Plagiarism

Answer(s): B

Explanation:

Trademark infringement is a violation of the exclusive rights attaching to a trademark without the authorization of the trademark owner or any licensees (provided that such authorization was within the scope of the license). Infringement may occur when one party, the 'infringer', uses a trademark that is identical or confusingly similar to a trademark owned by another party, in relation to products or services that are identical or similar to the products or services that the registration covers. An owner of a trademark may commence legal proceedings against a party that infringes its registration.
Answer option C is incorrect. Patent laws are used to protect the duplication of software. Software patents cover the algorithms and techniques that are used in creating the software. It does not cover the entire program of the software. Patents give the author the right to

make and sell his product. The time of the patent of a product is limited though, i.e., the author of the product has the right to use the patent for only a specific length of time.
Answer option A is incorrect. Copyright infringement, also known as copyright violation, is the use of material which is covered by copyright law, in a way that violates one of the original copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works that build upon it. The slang term bootleg (from the use of boots to smuggle items) is often used to describe illegally copied material. For media such as movies and music, unauthorized copying and distribution is occasionally called piracy or theft.
Answer option D is incorrect. Plagiarism is defined as the "use or close imitation of the language and thoughts of another author and the representation of them as one's own original work." While plagiarism in scholarship and journalism has a centuries-old history, the development of the Internet, where articles appear as electronic text, has made the physical act of copying the work of others much easier. Plagiarism is not copyright infringement.
While both terms may apply to a particular act, they are different transgressions. Copyright infringement is a violation of the rights of a copyright holder, when material protected by copyright is used without consent. On the other hand, plagiarism is concerned with the unearned increment to the plagiarizing author's reputation that is achieved through false claims of authorship.






Post your Comments and Discuss Certiport IC3-3 exam with other Community members:

IC3-3 Discussions & Posts