Exam 2: The Need for Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
In a ____ attack,the attacker sends a large number of connection or information requests to a target.
(Multiple Choice)
4.7/5
(41)
The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance._________________________
(True/False)
4.7/5
(39)
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
(Multiple Choice)
4.8/5
(40)
One form of online vandalism is ____ operations,which interfere with or disrupt systems to protest the operations,policies,or actions of an organization or government agency.
(Multiple Choice)
4.9/5
(35)
A computer virus consists of segments of code that perform ____________________ actions.
(Short Answer)
4.9/5
(40)
____ are machines that are directed remotely (usually by a transmitted command)by the attacker to participate in an attack.
(Multiple Choice)
4.8/5
(43)
Forces of nature,force majeure,or acts of God can present some of the most dangerous threats,because they are usually occur with very little warning and are beyond the control of people.
(True/False)
4.7/5
(39)
In the context of information security,____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
(Short Answer)
4.8/5
(37)
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
(True/False)
4.8/5
(37)
A(n)____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle.
(Essay)
4.8/5
(41)
The ____ data file contains the hashed representation of the user's password.
(Multiple Choice)
4.8/5
(43)
Once a(n)back door has infected a computer,it can redistribute itself to all e-mail addresses found on the infected system._________________________
(True/False)
4.8/5
(42)
Which of the following functions does information security perform for an organization?
(Multiple Choice)
4.8/5
(28)
Much human error or failure can be prevented with training and ongoing awareness activities.
(True/False)
4.9/5
(32)
The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack._________________________
(True/False)
4.9/5
(31)
Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.
(True/False)
4.9/5
(32)
Hackers are "people who use and create computer software to gain access to information illegally." _________________________
(True/False)
4.8/5
(42)
The timing attack explores the contents of a Web browser's ____________________.
(Essay)
4.7/5
(39)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)