Filters
Question type

Study Flashcards

The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack._________________________

A) True
B) False

Correct Answer

verifed

verified

A mail bomb is a form of DoS.

A) True
B) False

Correct Answer

verifed

verified

A computer virus consists of segments of code that perform ____________________ actions.

Correct Answer

verifed

verified

____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.


A) Drones
B) Helpers
C) Zombies
D) Servants

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Once a(n)back door has infected a computer,it can redistribute itself to all e-mail addresses found on the infected system._________________________

A) True
B) False

Correct Answer

verifed

verified

Attacks conducted by scripts are usually unpredictable.

A) True
B) False

Correct Answer

verifed

verified

Much human error or failure can be prevented with training and ongoing awareness activities.

A) True
B) False

Correct Answer

verifed

verified

Which of the following functions does information security perform for an organization?


A) Protecting the organization's ability to function.
B) Enabling the safe operation of applications implemented on the organization's IT systems.
C) Protecting the data the organization collects and uses.
D) All of the above.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

One form of online vandalism is ____ operations,which interfere with or disrupt systems to protest the operations,policies,or actions of an organization or government agency.


A) hacktivist
B) phvist
C) hackcyber
D) cyberhack

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

In a ____ attack,the attacker sends a large number of connection or information requests to a target.


A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.

A) True
B) False

Correct Answer

verifed

verified

The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance._________________________

A) True
B) False

Correct Answer

verifed

verified

A(n)____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle.

Correct Answer

verifed

verified

buffer ove...

View Answer

Forces of nature,force majeure,or acts of God can present some of the most dangerous threats,because they are usually occur with very little warning and are beyond the control of people.

A) True
B) False

Correct Answer

verifed

verified

Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.

A) True
B) False

Correct Answer

verifed

verified

Hackers are "people who use and create computer software to gain access to information illegally." _________________________

A) True
B) False

Correct Answer

verifed

verified

The timing attack explores the contents of a Web browser's ____________________.

Correct Answer

verifed

verified

The ____ data file contains the hashed representation of the user's password.


A) SLA
B) SNMP
C) FBI
D) SAM

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.


A) WWW
B) TCP
C) FTP
D) HTTP

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

In the context of information security,____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.

Correct Answer

verifed

verified

Showing 41 - 60 of 78

Related Exams

Show Answer