Exam 2: The Need for Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A(n) ____________________ is an application error that occurs when more data is sent to a program than it is designed to handle.
(Short Answer)
4.9/5
(32)
A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
(Short Answer)
4.8/5
(30)
With the removal of copyright protection mechanisms, software can be easily distributed and installed.
(True/False)
4.8/5
(40)
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
(True/False)
4.8/5
(43)
A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files-such as word-processing documents-and sensitive data transmitted to or from applications.
(True/False)
4.8/5
(29)
When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.
(Short Answer)
4.9/5
(37)
Which of the following is an example of a Trojan horse program
(Multiple Choice)
4.7/5
(36)
Duplication of software-based intellectual property is more commonly known as software ____________________.
(Short Answer)
4.7/5
(34)
A(n) ____________________ is an act against an asset that could result in a loss.
(Short Answer)
4.8/5
(43)
Showing 81 - 91 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)