Exam 2: The Need for Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is a technique used to gain unauthorized access to computers,wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

Free
(Short Answer)
4.9/5
(36)
Correct Answer:
Verified

Spoofing

Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

The macro virus infects the key operating system files located in a computer's boot sector._________________________

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

False

There are generally two skill levels among hackers: expert and ____.

(Multiple Choice)
4.9/5
(42)

One form of e-mail attack that is also a DoS is called a mail spoof,in which an attacker routes large quantities of e-mail to the target._________________________

(True/False)
4.8/5
(43)

A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

(Multiple Choice)
4.9/5
(32)

Which of the following is an example of a Trojan horse program?

(Multiple Choice)
4.8/5
(32)

In the well-known ____ attack,an attacker monitors (or sniffs)packets from the network,modifies them,and inserts them back into the network.

(Multiple Choice)
4.8/5
(35)

DoS attacks cannot be launched against routers.

(True/False)
4.9/5
(42)

"4-1-9" fraud is an example of a ____ attack.

(Multiple Choice)
4.8/5
(33)

Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL)which is longer than ____ characters in Internet Explorer 4.0,the browser will crash.

(Multiple Choice)
4.8/5
(33)

List at least six general categories of threat.

(Essay)
4.8/5
(31)

____ is any technology that aids in gathering information about a person or organization without their knowledge.

(Multiple Choice)
4.9/5
(33)

A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.

(True/False)
4.9/5
(35)

Script ____________________ are hackers of limited skill who use expertly written software to attack a system.

(Short Answer)
4.9/5
(37)

When information gatherers employ techniques that cross the threshold of what is legal or ethical,they are conducting industrial ____________________.

(Short Answer)
4.8/5
(33)

A(n)____________________ is an object,person,or other entity that represents an ongoing danger to an asset.

(Short Answer)
4.9/5
(46)

With electronic information is stolen,the crime is readily apparent.

(True/False)
4.9/5
(41)

A(n)____________________ hacks the public telephone network to make free calls or disrupt services.

(Short Answer)
4.9/5
(35)

Attempting to reverse-calculate a password is called ____________________.

(Essay)
4.7/5
(37)
Showing 1 - 20 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)