Exam 1: The Threat Environment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most cookies are dangerous.

Free
(True/False)
4.9/5
(31)
Correct Answer:
Verified

False

Watching someone type their password in order to learn the password is called ________.

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

B

The primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

The definition of hacking is "intentionally accessing a computer resource without authorization or in excess of authorization."

(True/False)
4.8/5
(32)

The terms "intellectual property" and "trade secret" are synonymous.

(True/False)
4.9/5
(36)

The three common core goals of security are ________.

(Multiple Choice)
4.9/5
(34)

What type of employee is the most dangerous when it comes to internal IT attacks?

(Multiple Choice)
4.9/5
(39)

Confidentiality means that attackers cannot change or destroy information.

(True/False)
4.9/5
(31)

Which of the following can be a type of spyware?

(Multiple Choice)
4.8/5
(39)

________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer.)

(Multiple Choice)
4.9/5
(39)

About how long was the Sony PlayStation Network offline as a result of the cyber attacks?

(Multiple Choice)
4.7/5
(35)

When a threat succeeds in causing harm to a business, this is called a ________.

(Multiple Choice)
4.8/5
(33)

In a virus, the code that does damage is called the ________.

(Multiple Choice)
4.9/5
(32)

Money mules transfer stolen money for criminals and take a small percentage for themselves.

(True/False)
4.8/5
(41)

Attackers rarely use IP address spoofing to conceal their identities.

(True/False)
4.7/5
(35)

Preventative countermeasures identify when a threat is attacking and especially when it is succeeding.

(True/False)
4.8/5
(40)

Compared to non-computer crime, computer crime is very small.

(True/False)
4.8/5
(35)

Social engineering is rarely used in hacking.

(True/False)
4.8/5
(37)

A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets.

(Multiple Choice)
4.7/5
(35)

Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.

(True/False)
4.8/5
(40)
Showing 1 - 20 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)