Exam 14: Choosing Defense Strategies

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which is NOT an encryption program discussed by the author?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

D

Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

D

Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.

Free
(Short Answer)
4.8/5
(24)
Correct Answer:
Verified

propaganda

Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.

(Short Answer)
4.8/5
(33)

____________ is any attempt to manipulate information in pursuit of a military or political goal.

(Short Answer)
4.9/5
(35)

A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.

(Short Answer)
4.7/5
(41)

Attempting to acquire information to which one does not have legitimate access is called ____________.

(Short Answer)
4.9/5
(35)

Where did the first known attack by terrorists against a country's computer systems occur?

(Multiple Choice)
4.9/5
(34)

Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:

(Multiple Choice)
4.7/5
(30)

Which is a multi-platform packet sniffer?

(Multiple Choice)
4.8/5
(34)

Which permits a user to read sensitive data without ever having physical access to the target system?

(Multiple Choice)
4.8/5
(42)

Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.

(Short Answer)
4.9/5
(35)

Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?

(Multiple Choice)
4.9/5
(30)

What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?

(Multiple Choice)
4.8/5
(39)

____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.

(Short Answer)
4.9/5
(38)

Which is likely to be a more threatening type of computer attack?

(Multiple Choice)
4.8/5
(35)

Which is LEAST likely to provide access to sensitive data to unauthorized people?

(Multiple Choice)
4.8/5
(35)

The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:

(Multiple Choice)
4.8/5
(35)

Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?

(Multiple Choice)
4.8/5
(24)

The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.

(Short Answer)
4.8/5
(39)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)