Exam 1: Introduction and Security Trends

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Viruses have no useful purpose.

(True/False)
4.8/5
(44)

When information is modified by individuals not authorized to change it you have suffered a

(Multiple Choice)
4.7/5
(36)

What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988?

(Multiple Choice)
4.8/5
(38)

_______________ are hackers who do not have enough technical skill to discovery vulnerabilities on their own,and cannot write their own scripts to exploit vulnerabilities.

(Short Answer)
4.7/5
(36)

The two general reasons a particular computer system is attacked: either it is specifically targeted by the attacker,or it is a(n)_______________.

(Short Answer)
4.8/5
(29)

Who is Kevin Mitnick?

(Multiple Choice)
4.9/5
(34)

Information warfare is

(Multiple Choice)
4.7/5
(29)

Why is the Morris worm significant?

(Multiple Choice)
5.0/5
(30)

What was the Slammer Worm/Virus?

(Multiple Choice)
4.9/5
(35)

If the system is infected with a time bomb,it means that

(Multiple Choice)
4.8/5
(29)

One significant trend observed over the last several years has been the decrease in the number of computer attacks by nonaffiliated intruders as opposed to attacks by organized hacking groups,criminal organizations,or nations.

(True/False)
4.9/5
(41)

The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small,tightly contained mainframes to a highly widespread network of much larger systems.

(True/False)
4.7/5
(38)

A successful attack on a network may adversely impact security in all the following ways EXCEPT:

(Multiple Choice)
4.8/5
(30)

Each of the infected systems became part of what is known as a bot network,which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users,as a result of the

(Multiple Choice)
4.8/5
(31)

What are the three types of losses that can result from an attack on information?

(Short Answer)
4.7/5
(41)

In April 2009,Homeland Security Secretary Janet Napolitano told reporters

(Multiple Choice)
4.7/5
(35)

Briefly explain the steps in an attack.

(Essay)
4.7/5
(35)

In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.

(Short Answer)
4.8/5
(30)

What is an elite hacker?

(Multiple Choice)
4.9/5
(35)

Vladimir Levin was able to steal $10 Million from _______________ by using its cash management system.

(Short Answer)
4.8/5
(40)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)