Exam 2: The Need for Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A mail bomb is a form of DoS attack.

(True/False)
4.7/5
(30)

Some information gathering techniques are quite legal-for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.

(Short Answer)
4.9/5
(32)

"4-1-9" fraud is an example of a ____________________ attack.

(Multiple Choice)
4.9/5
(32)

Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.

(Multiple Choice)
4.8/5
(37)

Much human error or failure can be prevented with effective training and ongoing awareness activities.

(True/False)
4.8/5
(28)

____  is any technology that aids in gathering information about a person or organization without their knowledge.

(Multiple Choice)
4.8/5
(40)

Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.

(True/False)
5.0/5
(36)

The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

(Multiple Choice)
4.9/5
(39)

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

(Multiple Choice)
4.8/5
(33)

A(n) ____________________ is a potential risk to an information asset.

(Short Answer)
4.8/5
(30)

A(n) ____________________ is a potential weakness in an asset or its defensive control(s).

(Short Answer)
4.9/5
(44)

Describe the capabilities of a sniffer.

(Essay)
4.7/5
(34)

A worm requires that another program is running before it can begin functioning.

(True/False)
4.8/5
(36)

The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________

(True/False)
5.0/5
(42)

When electronic information is stolen, the crime is readily apparent.

(True/False)
4.9/5
(34)

One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________

(True/False)
4.8/5
(30)

Which of the following functions does information security perform for an organization  

(Multiple Choice)
4.8/5
(34)

____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

(Multiple Choice)
4.8/5
(44)

The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________

(True/False)
4.9/5
(43)

Media as a subset of information assets are the systems and networks that store, process, and transmit information.

(True/False)
4.7/5
(37)
Showing 41 - 60 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)