Exam 2: The Need for Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.

Free
(Short Answer)
4.8/5
(38)
Correct Answer:
Verified

espionage

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

A(n) ____________________ is an act against an asset that could result in a loss.

Free
(Short Answer)
4.7/5
(41)
Correct Answer:
Verified

attack

A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.

(Short Answer)
4.8/5
(29)

The ____________________ data file contains the hashed representation of the user's password.

(Multiple Choice)
4.9/5
(30)

As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.

(True/False)
4.8/5
(35)

A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.

(Short Answer)
4.8/5
(37)

Which of the following is an example of a Trojan horse program?

(Multiple Choice)
5.0/5
(31)

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.

(Multiple Choice)
5.0/5
(35)

Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________

(True/False)
4.8/5
(34)

​A short-term decrease in electrical power availability is known as a(n) ___________.

(Multiple Choice)
4.8/5
(38)

The expert hacker sometimes is called a(n) ____________________ hacker.

(Short Answer)
4.9/5
(30)

_________ is the percentage of time a particular service is available.

(Short Answer)
4.9/5
(37)

When electronic information is stolen, the crime is readily apparent.

(True/False)
4.8/5
(34)

Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.

(True/False)
4.9/5
(41)

The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.

(Multiple Choice)
4.9/5
(32)

In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.

(Short Answer)
4.7/5
(39)

ESD is the acronym for ____________________ discharge.

(Short Answer)
4.8/5
(40)

Describe viruses and worms.

(Essay)
4.8/5
(37)

The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as __________.

(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)