Exam 7: Procedures for Responding to Attacks on Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Match the following terms to the appropriate definitions.
Lost system functionality and effectiveness
Terrorist incident
An organized effort to use cyberattacks to disrupt computer systems
Malicious code attack
Computer code that is meant to damage or disrupt computer systems
Ping of death
Correct Answer:
Verified
Premises:
Responses:
Lost system functionality and effectiveness
Terrorist incident
An organized effort to use cyberattacks to disrupt computer systems
Malicious code attack
Computer code that is meant to damage or disrupt computer systems
Ping of death
A hacker takes advantage of a trust relationship within a network
Autorooters
A violent act that endangers human life
Loss of availability
Programs that automate the entire hacking process
Information warfare
Malicious software that is attached to another program
Trust exploitation attack
An attack that combines features of several DoS attacks
Virus
Gathering of information about a target network using publicly available data
Network reconnaissance
Attacks that send oversized IP packets to a computer system
Stacheldraht
(Matching)
4.9/5
(33)

Which act was implemented to protect the privacy of people identified in information systems maintained by federal executive branch agencies, and to control the collection, use, and sharing of information?

(Multiple Choice)
4.9/5
(28)

____ are programs that allow intruders to scan hundreds of thousands of systems quite quickly.

(Multiple Choice)
4.7/5
(34)

____ are software applications that use a network adapter card in "promiscuous" mode.

(Multiple Choice)
4.9/5
(37)

The FBI defines Cyberterrorism as a violent act that intimidates a government and its citizens.

(True/False)
4.8/5
(35)
Showing 61 - 65 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)