Exam 2: The Need for Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Some information gathering techniques are quite legal-for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.
(Short Answer)
4.9/5
(32)
"4-1-9" fraud is an example of a ____________________ attack.
(Multiple Choice)
4.9/5
(32)
Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.
(Multiple Choice)
4.8/5
(37)
Much human error or failure can be prevented with effective training and ongoing awareness activities.
(True/False)
4.8/5
(28)
____ is any technology that aids in gathering information about a person or organization without their knowledge.
(Multiple Choice)
4.8/5
(40)
Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.
(True/False)
5.0/5
(36)
The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
(Multiple Choice)
4.9/5
(39)
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.
(Multiple Choice)
4.8/5
(33)
A(n) ____________________ is a potential risk to an information asset.
(Short Answer)
4.8/5
(30)
A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
(Short Answer)
4.9/5
(44)
A worm requires that another program is running before it can begin functioning.
(True/False)
4.8/5
(36)
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________
(True/False)
5.0/5
(42)
When electronic information is stolen, the crime is readily apparent.
(True/False)
4.9/5
(34)
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________
(True/False)
4.8/5
(30)
Which of the following functions does information security perform for an organization
(Multiple Choice)
4.8/5
(34)
____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.
(Multiple Choice)
4.8/5
(44)
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________
(True/False)
4.9/5
(43)
Media as a subset of information assets are the systems and networks that store, process, and transmit information.
(True/False)
4.7/5
(37)
Showing 41 - 60 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)