Exam 1: Introduction to Computer Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Someone who gains access to a system and causes harm is a __________?

Free
(Multiple Choice)
4.8/5
(22)
Correct Answer:
Verified

B

A(n)______ is a basic security device that filters traffic and is a barrier between a network and the outside world or between a system and other systems.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

The type of hacking that involves breaking into telephone systems is called sneaking.

Free
(True/False)
4.9/5
(43)
Correct Answer:
Verified

False

The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems,conduct computer security training,and develop computer security plans.

(True/False)
4.9/5
(29)

Confidentiality,integrity,and availability are three pillars of the CIA triangle.

(True/False)
4.8/5
(27)

Malware is a generic term for software that has a malicious purpose.

(True/False)
4.9/5
(35)

Which of these is a repository for detailed information on virus outbreaks?

(Multiple Choice)
4.9/5
(32)

The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand.

(True/False)
4.8/5
(37)

Which of these is a repository of security-related documentation and also sponsors a number of security research projects?

(Multiple Choice)
4.9/5
(39)

Your company is instituting a new security awareness program.You are responsible for educating end users on a variety of threats,including social engineering.Which of the following best defines social engineering?

(Multiple Choice)
4.8/5
(51)

The technique for breaching a system's security by exploiting human nature rather than technology is war-driving.

(True/False)
4.9/5
(31)

Someone who finds a flaw in a system and reports that flaw to the vendor of the system is a __________.

(Multiple Choice)
4.8/5
(32)

Which of these was the first computer incident-response team?

(Multiple Choice)
4.9/5
(30)

Software that lays dormant until some specific condition is met is a Trojan horse.

(True/False)
4.8/5
(32)

A(n)hides the internal network's IP address and presents a single IP address to the outside world.

(Multiple Choice)
4.9/5
(33)

Someone who legally breaks into a system to assess security deficiencies is a ________.

(Multiple Choice)
4.8/5
(34)

Someone who calls himself a hacker but lacks the expertise is a ________.

(Multiple Choice)
4.8/5
(41)

Someone who breaks into a system legally to assess security deficiencies is a sneaker.

(True/False)
4.7/5
(32)

Auditing is the process to determine if a user's credentials are authorized to access a network resource.

(True/False)
4.8/5
(32)

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)