Exam 2: The Need for Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

A

_________ is the percentage of time a particular service is available.

Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Verified

​uptime
up-time
up time​

Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

The average amount of time until the next hardware failure is known as __________.

(Multiple Choice)
4.9/5
(41)

When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________

(True/False)
4.9/5
(36)

Media are items of fact collected by an organization and include raw numbers, facts, and words.

(True/False)
4.8/5
(38)

A short-term interruption in electrical power availability is known as a ____.

(Multiple Choice)
4.7/5
(37)

The macro virus infects the key operating system files located in a computer's start-up sector. _________________________

(True/False)
4.8/5
(46)

Describe viruses and worms.

(Essay)
4.8/5
(32)

__________ occurs when an application running on a Web server inserts commands into a user's browser session and causes information to be sent to a hostile server.

(Short Answer)
4.7/5
(31)

Hackers can be generalized into two skill groups: expert and ____________________.

(Multiple Choice)
4.9/5
(32)

Script ____________________ are hackers of limited skill who use expertly written software to attack a system.

(Short Answer)
4.7/5
(41)

Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).

(True/False)
4.8/5
(32)

The ____________________ fraud is a social engineering attack that involves convincing the victim to participate in a seeming money-making venture while getting the victim to pay fees or bribes or to refund uncleared international payments.

(Short Answer)
4.9/5
(40)

Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________

(True/False)
4.8/5
(35)

A computer virus consists of segments of code that perform ____________________ actions.

(Short Answer)
4.8/5
(31)

One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.

(Multiple Choice)
4.8/5
(43)

Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________

(True/False)
4.7/5
(33)

A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

(Multiple Choice)
4.7/5
(33)

Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ____________________ characters in Internet Explorer 4.0, the browser will crash.

(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)