A prof gets bored sometimes

* Quiz not to be taken seriously

I was grading quizzes recently and thought that readers might enjoy some of the questions that I put into my information assurance quizzes and exams when I get bored with writing out serious ones. Here’s a sampler of a few questions that I’ve had fun writing for my students. Answers are at the end.

1. What kinds of conflicts have occurred in the use of the DNS and the use of trademarks?

a: Cybersquashers have tried to trademark the names of existing domains without permission of the domain owners.

b: Cybercrushers have registered Digital Nomenclature Sequences while holding other people’s domains.

c: Cybersquatters have left Direct Nomenclature Serial numbers unused while waiting for payments from legitimate owners of their Internet Protocol subassembly integration units.

d: Cybersquatters have registered domains using trademarks without permission of the trademark owners.

e: None of the above.

2. What is “Dumpster Diving” in computer crime?

a: Using underwater breathing apparatus to enter a secured location from the sewers.

b: Throwing computers in the trash to avoid detection by law enforcement authorities.

c: Bribing facilities personnel to provide access through the garbage-disposal chutes.

d: Retrieving garbage to extract information.

e: None of the above.

3. Why is a Trojan horse program called that?

a: Because of the story of how Odysseus got Greek soldiers into the city of Troy by putting them in a big wooden horse.

b: Because of the story of a famous race-horse who won the Kentucky Derby in 1932 even though he was actually a very large mule.

c: Because of how Al Capone sold condoms to the U.S. Army which were actually party balloons.

d: All of the above.

4. What’s a Salami Fraud?

a: A technique of brute-force cryptanalysis involving the use of large sausages to beat victims about the head until they reveal decryption keys.

b: A large computer crime sandwiched between two smaller computer crimes.

c: A computer crime involving the repeated theft of small amounts of computer resources or money.

d: All of the above.

e: None of the above.

5. How can you absolutely stop data leakage from your organization?

a: Apply a sealant to all the Internet pipes.

b: Modify the operating system to prevent all data copying to removable media such as USB flash drives, diskettes, tapes or printers.

c: Thicken the data using special encoding techniques so that they cannot fall out of the cracks in your firewalls.

d: All of the above.

e: None of the above.

6. When a network interface card is controlled by a sniffer program so that it captures all packets going by regardless of destination, we say that the NIC has been put into:

a: Party mode.

b: Promiscuous mode.

c: [Bad word for sexually profligate men removed to placate spam filters and sensitive readers] mode.

d: [Bad word for sexually profligate women removed to placate spam filters and sensitive readers] mode.

e: None of the above.

This last question got me into a lot of trouble because several students complained that answers (c) and (d) were sexist and offensive. I include it here as a joke on myself; I have not used these terms in an exam since that blistering experience.

Answers: 1.d 2.d 3.a 4.c 5.e 6.b

Learn more about this topic

Review: Cracking the wireless security code

Network World, 10/04/04

SurfControl turns a trick on phishers

Network World, 10/04/04

Start-up takes new anti-virus tack

Network World, 10/04/04

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Take IDG’s 2020 IT Salary Survey: You’ll provide important data and have a chance to win $500.