Exam 2: The Need for Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
A worm requires that another program is running before it can begin functioning.
(True/False)
4.8/5
(26)
Intellectual property is defined as "the ownership of ideas and control over the tangible or virtual representation of those ideas." _________________________
(True/False)
4.7/5
(47)
Sniffers often work on TCP/IP networks,where they're sometimes called packet sniffers._________________________
(True/False)
4.8/5
(34)
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
(Multiple Choice)
4.7/5
(39)
Some information gathering techniques are quite legal,for example,using a Web browser to perform market research.These legal techniques are called,collectively,competitive ____________________.
(Short Answer)
4.7/5
(38)
The expert hacker sometimes is called ____________________ hacker.
(Short Answer)
4.9/5
(39)
A virus or worm can have a payload that installs a(n)____________________ door or trap door component in a system,which allows the attacker to access the system at will with special privileges.
(Essay)
4.8/5
(27)
The malicious code attack includes the execution of viruses,worms,Trojan horses,and active Web scripts with the intent to destroy or steal information._________________________
(True/False)
4.9/5
(39)
Packet kiddies use automated exploits to engage in distributed denial-of-service attacks._________________________
(True/False)
4.8/5
(42)
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication._________________________
(True/False)
4.8/5
(45)
Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
(True/False)
4.7/5
(31)
Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways._________________________
(True/False)
4.9/5
(47)
A(n)polymorphic threat is one that over time changes the way it appears to antivirus software programs,making it undetectable by techniques that look for preconfigured signatures._________________________
(True/False)
4.8/5
(38)
Information security safeguards the technology assets in use at the organization.
(True/False)
4.9/5
(42)
An act of theft performed by a hacker falls into the category of "theft," but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of "forces of nature."
(True/False)
4.9/5
(40)
Showing 61 - 78 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)