Exam 2: The Need for Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hackers are "persons who access systems and information without authorization and often illegally." _________________________

(True/False)
4.8/5
(37)

Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________

(True/False)
4.8/5
(41)

____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

(Short Answer)
4.8/5
(36)

Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.

(True/False)
4.9/5
(38)

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.

(Multiple Choice)
4.8/5
(41)

A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________

(True/False)
4.9/5
(40)

A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.

(Short Answer)
4.9/5
(36)

____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.

(Multiple Choice)
4.8/5
(40)

​A short-term decrease in electrical power availability is known as a(n) ___________.

(Multiple Choice)
4.8/5
(34)

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.

(Multiple Choice)
4.7/5
(39)

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.

(Multiple Choice)
4.9/5
(37)

Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.

(True/False)
4.8/5
(41)

A momentary low voltage is called a(n) ____________________.

(Short Answer)
4.8/5
(39)

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. _________________________

(True/False)
4.8/5
(37)

Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay discovery. The first act is obviously in the category of  "theft" but the second act is another category-in this case it is a "force of nature." 

(True/False)
4.9/5
(33)

Packet munchkins use automated exploits to engage in distributed denial-of-service attacks. _________________________

(True/False)
4.9/5
(31)

​A long-term interruption (outage) in electrical power availability is known as a(n) ___________.

(Multiple Choice)
4.8/5
(44)

There are 12 general categories of threat to an organization's people, information, and systems. List at least six of the general categories of threat and identify at least one example of those listed.

(Essay)
4.8/5
(37)

The information security function in an organization safeguards its technology assets.

(True/False)
4.8/5
(31)

As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.

(True/False)
4.8/5
(29)
Showing 21 - 40 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)