Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the responsibilities of a data custodian?

(Essay)
4.7/5
(38)

To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the system not allow access (or availability) to anyone.

(True/False)
4.8/5
(39)

Provide an example of a social engineering attack.

(Essay)
4.7/5
(44)

In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Protocol spoofing techniques, and then inserts them back into the network.

(Short Answer)
4.8/5
(41)

____ is a technique used to gain unauthorized access to computers, wherein the attacker assumes or simulates an address that indicate to the victim that the messages are coming from the address of a trusted host.

(Multiple Choice)
4.8/5
(45)

Match each item with a statement below. -Malicious program that replicates itself constantly.

(Multiple Choice)
4.7/5
(38)

Describe a dictionary attack.

(Essay)
4.7/5
(34)

What important organizational functions are performed by Information Security?

(Essay)
4.8/5
(41)

A prolonged increase in power is called a ____.

(Multiple Choice)
4.9/5
(36)

The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.

(Multiple Choice)
4.8/5
(34)

A majority of organizations use information systems primarily to support their strategic planning.

(True/False)
4.9/5
(29)

Match each item with a statement below. -Software programs that reveals its designed behavior only when activated.

(Multiple Choice)
4.7/5
(38)

An individual who hacks the public telephone network to make free calls or disrupt services is called a ____.

(Multiple Choice)
4.9/5
(34)

Match each item with a statement below. -Information is free from mistakes or errors.

(Multiple Choice)
4.8/5
(27)

Describe the difference between direct and indirect attacks.

(Essay)
4.7/5
(38)

-According the to CSI/FBI Computer Crime and Security Survey, the most dominant type of attack for the last decade was ____.

(Multiple Choice)
4.8/5
(28)

Match each item with a statement below. -Responsible for the security and use of a particular set of information.

(Multiple Choice)
4.9/5
(41)

Describe the balance between information security and access.

(Essay)
4.7/5
(27)

What is defense in depth?

(Essay)
4.8/5
(22)

A(n) ____________________ is an application error that occurs when more data is sent to a buffer than it can handle.

(Short Answer)
4.9/5
(37)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)