Filters
Question type

The average amount of time until the next hardware failure is known as __________.


A) ​​mean time between failure (MTBF)
B) ​mean time to diagnose (MTTD)
C) ​mean time to failure (MTTF)
D) ​mean time to repair (MTTR)

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

​A long-term interruption (outage) in electrical power availability is known as a(n) ___________.


A) ​blackout
B) ​sag
C) ​brownout
D) ​fault

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.


A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

The macro virus infects the key operating system files located in a computer's start-up sector. _________________________

A) True
B) False

Correct Answer

verifed

verified

With the removal of copyright protection mechanisms, software can be easily distributed and installed.

A) True
B) False

Correct Answer

verifed

verified

A mail bomb is a form of DoS attack.

A) True
B) False

Correct Answer

verifed

verified

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

A) True
B) False

Correct Answer

verifed

verified

The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________

A) True
B) False

Correct Answer

verifed

verified

Attempting to reverse-calculate a password is called ____________________.

Correct Answer

verifed

verified

A momentary low voltage is called a(n) ____________________.

Correct Answer

verifed

verified

____________________ is unsolicited commercial e-mail.

Correct Answer

verifed

verified

A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.


A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Much human error or failure can be prevented with effective training and ongoing awareness activities.

A) True
B) False

Correct Answer

verifed

verified

Attacks conducted by scripts are usually unpredictable.

A) True
B) False

Correct Answer

verifed

verified

Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________

A) True
B) False

Correct Answer

verifed

verified

____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.


A) Drones
B) Helpers
C) Zombies
D) Servants

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________

A) True
B) False

Correct Answer

verifed

verified

A worm requires that another program is running before it can begin functioning.

A) True
B) False

Correct Answer

verifed

verified

Media are items of fact collected by an organization and include raw numbers, facts, and words.

A) True
B) False

Correct Answer

verifed

verified

Some information gathering techniques are quite legal-for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.

Correct Answer

verifed

verified

Showing 61 - 80 of 91

Related Exams

Show Answer