Exam 2: The Need for Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe viruses and worms.

(Essay)
4.9/5
(51)

____________________ is unsolicited commercial e-mail.

(Short Answer)
4.8/5
(34)

A worm requires that another program is running before it can begin functioning.

(True/False)
4.8/5
(26)

Intellectual property is defined as "the ownership of ideas and control over the tangible or virtual representation of those ideas." _________________________

(True/False)
4.7/5
(47)

Sniffers often work on TCP/IP networks,where they're sometimes called packet sniffers._________________________

(True/False)
4.8/5
(34)

Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

(Multiple Choice)
4.7/5
(39)

Some information gathering techniques are quite legal,for example,using a Web browser to perform market research.These legal techniques are called,collectively,competitive ____________________.

(Short Answer)
4.7/5
(38)

The expert hacker sometimes is called ____________________ hacker.

(Short Answer)
4.9/5
(39)

A virus or worm can have a payload that installs a(n)____________________ door or trap door component in a system,which allows the attacker to access the system at will with special privileges.

(Essay)
4.8/5
(27)

ESD means electrostatic ____________________.

(Essay)
4.8/5
(46)

The malicious code attack includes the execution of viruses,worms,Trojan horses,and active Web scripts with the intent to destroy or steal information._________________________

(True/False)
4.9/5
(39)

Packet kiddies use automated exploits to engage in distributed denial-of-service attacks._________________________

(True/False)
4.8/5
(42)

The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication._________________________

(True/False)
4.8/5
(45)

Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.

(True/False)
4.7/5
(31)

Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways._________________________

(True/False)
4.9/5
(47)

A(n)polymorphic threat is one that over time changes the way it appears to antivirus software programs,making it undetectable by techniques that look for preconfigured signatures._________________________

(True/False)
4.8/5
(38)

Information security safeguards the technology assets in use at the organization.

(True/False)
4.9/5
(42)

An act of theft performed by a hacker falls into the category of "theft," but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of "forces of nature."

(True/False)
4.9/5
(40)
Showing 61 - 78 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)