Exam 4: Basic Information Security Model

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A buffer overflow vulnerability refers to a situation where

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

C

Relative to physical security, information security is challenging because

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

Vulnerabilities in IT systems can be eliminated through secure coding practices

Free
(True/False)
4.7/5
(36)
Correct Answer:
Verified

False

Malware refers to

(Multiple Choice)
4.9/5
(35)

Denial of service refers to

(Multiple Choice)
4.8/5
(36)

Zombies are

(Multiple Choice)
4.7/5
(33)

Assets are

(Multiple Choice)
4.9/5
(29)

The NVD database

(Multiple Choice)
4.8/5
(44)

A cross-site scripting vulnerability can occur when

(Multiple Choice)
4.9/5
(39)

Physical controls

(Multiple Choice)
4.8/5
(28)

Threats are

(Multiple Choice)
4.9/5
(30)

Controls are

(Multiple Choice)
4.9/5
(37)

Rootkits are

(Multiple Choice)
4.9/5
(45)

Zero-day exploits are

(Multiple Choice)
4.8/5
(36)

As reported in the chapter, recent trends in vulnerabilities and threats indicate that

(Multiple Choice)
4.7/5
(41)

Vulnerabilities are

(Multiple Choice)
4.7/5
(34)

A lack of input validation vulnerability refers to a situation where

(Multiple Choice)
4.7/5
(39)

Phishing refers to

(Multiple Choice)
4.8/5
(32)

A SQL injection vulnerability is an example of a

(Multiple Choice)
4.8/5
(37)

Zeus and Spyeye are examples of

(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)