Exam 2: The Need for Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
____________________ is a technique used to gain unauthorized access to computers,wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
Free
(Short Answer)
4.9/5
(36)
Correct Answer:
Spoofing
Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
The macro virus infects the key operating system files located in a computer's boot sector._________________________
Free
(True/False)
4.7/5
(34)
Correct Answer:
False
There are generally two skill levels among hackers: expert and ____.
(Multiple Choice)
4.9/5
(42)
One form of e-mail attack that is also a DoS is called a mail spoof,in which an attacker routes large quantities of e-mail to the target._________________________
(True/False)
4.8/5
(43)
A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
(Multiple Choice)
4.9/5
(32)
Which of the following is an example of a Trojan horse program?
(Multiple Choice)
4.8/5
(32)
In the well-known ____ attack,an attacker monitors (or sniffs)packets from the network,modifies them,and inserts them back into the network.
(Multiple Choice)
4.8/5
(35)
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL)which is longer than ____ characters in Internet Explorer 4.0,the browser will crash.
(Multiple Choice)
4.8/5
(33)
____ is any technology that aids in gathering information about a person or organization without their knowledge.
(Multiple Choice)
4.9/5
(33)
A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.
(True/False)
4.9/5
(35)
Script ____________________ are hackers of limited skill who use expertly written software to attack a system.
(Short Answer)
4.9/5
(37)
When information gatherers employ techniques that cross the threshold of what is legal or ethical,they are conducting industrial ____________________.
(Short Answer)
4.8/5
(33)
A(n)____________________ is an object,person,or other entity that represents an ongoing danger to an asset.
(Short Answer)
4.9/5
(46)
With electronic information is stolen,the crime is readily apparent.
(True/False)
4.9/5
(41)
A(n)____________________ hacks the public telephone network to make free calls or disrupt services.
(Short Answer)
4.9/5
(35)
Attempting to reverse-calculate a password is called ____________________.
(Essay)
4.7/5
(37)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)