Exam 2: The Need for Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.
Free
(Short Answer)
4.8/5
(38)
Correct Answer:
espionage
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
A
A(n) ____________________ is an act against an asset that could result in a loss.
Free
(Short Answer)
4.7/5
(41)
Correct Answer:
attack
A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
(Short Answer)
4.8/5
(29)
The ____________________ data file contains the hashed representation of the user's password.
(Multiple Choice)
4.9/5
(30)
As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.
(True/False)
4.8/5
(35)
A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
(Short Answer)
4.8/5
(37)
Which of the following is an example of a Trojan horse program?
(Multiple Choice)
5.0/5
(31)
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.
(Multiple Choice)
5.0/5
(35)
Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________
(True/False)
4.8/5
(34)
A short-term decrease in electrical power availability is known as a(n) ___________.
(Multiple Choice)
4.8/5
(38)
The expert hacker sometimes is called a(n) ____________________ hacker.
(Short Answer)
4.9/5
(30)
_________ is the percentage of time a particular service is available.
(Short Answer)
4.9/5
(37)
When electronic information is stolen, the crime is readily apparent.
(True/False)
4.8/5
(34)
Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.
(True/False)
4.9/5
(41)
The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.
(Multiple Choice)
4.9/5
(32)
In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
(Short Answer)
4.7/5
(39)
The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as __________.
(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)