Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

(True/False)
4.9/5
(40)

Which of these is most representative of a DDoS attack?

(Multiple Choice)
4.8/5
(34)

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:

(Multiple Choice)
4.9/5
(36)

_____ are highly restrictive programs that permit communication only with approved entities and / or in an approved manner.

(Short Answer)
4.8/5
(47)

_____ refers to a trusted third party that provides authentication services in public key encryption schemes.

(Short Answer)
4.7/5
(38)

Hardware failure is the least likely of threats to one's data.

(True/False)
4.9/5
(43)

Describe briefly a few of the physical threats posed by hackers to information security with examples for each.

(Essay)
4.9/5
(28)

_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.

(Short Answer)
4.8/5
(36)

An example of an exploit of unpatched vulnerability is:

(Multiple Choice)
4.7/5
(43)

A screen capture can be defined as a type of software that:

(Multiple Choice)
4.9/5
(42)
Showing 81 - 90 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)