Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY CH2

  • Question 1

    1 out of 1 points
    With the theft of electronic information, the evidence of a crime is readily apparent.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 2

    2 out of 2 points
    In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
    Selected Answer:
    Correct 
    man-in-the-middle
    Correct Answer:
    Correct man-in-the-middle
  • Question 3

    2 out of 2 points
    A(n) ____________________ is an object, person, or other entity that represents a constant danger to an asset.
    Selected Answer:
    Correct threat agent
    Correct Answer:
    Evaluation MethodCorrect AnswerCase Sensitivity
    CorrectExact Matchthreat
    CorrectExact Matchthreat agent
  • Question 4

    1 out of 1 points
    The term phreaker is now commonly associated with an individual who “cracks” or removes software protection that is designed to prevent unauthorized duplication.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 5

    2 out of 2 points
    A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
    Selected Answer:
    Correct 
    distributed denial-of-service
    Correct Answer:
    Correct distributed denial-of-service
  • Question 6

    2 out of 2 points
    ____ are software programs that hide their true nature, and reveal their designed behavior only when activated.
    Selected Answer:
    Correct 
    Trojan horses
    Correct Answer:
    Correct Trojan horses
  • Question 7

    2 out of 2 points
    ____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.
    Selected Answer:
    Correct 
    Cyberterrorism
    Correct Answer:
    Correct Cyberterrorism
  • Question 8

    1 out of 1 points
    A mail bomb is a form of DoS.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 9

    2 out of 2 points
    Within the context of information security, __________ is the process of using interpersonal skills to convince people to reveal access credentials or other valuable information to the attacker.
    Selected Answer:
    Correct 
    social engineering
    Correct Answer:
    Correct social engineering
  • Question 10

    2 out of 2 points
    A(n) __________ is an identified weakness in a controlled system, where controls are not present or are no longer effective
    Selected Answer:
    Correct 
    vulnerability
    Correct Answer:
    Correct vulnerability
  • Question 11

    2 out of 2 points
    ____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
    Selected Answer:
    Correct 
    Zombies
    Correct Answer:
    Correct Zombies
  • Question 12

    2 out of 2 points
    A(n) ____________________ is an act or action that takes advantage of a vulnerability to compromise a controlled system.
    Selected Answer:
    Correct attack
    Correct Answer:
    Evaluation MethodCorrect AnswerCase Sensitivity
    CorrectExact Matchattack
    CorrectExact Matchexploit
  • Question 13

    2 out of 2 points
    A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication.
    Selected Answer:
    Correct worm
    Correct Answer:
    Evaluation MethodCorrect AnswerCase Sensitivity
    CorrectExact Matchworm
  • Question 14

    1 out of 1 points
    A firewall is a device that keeps certain kinds of network traffic out of a private network.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 15

    1 out of 1 points
    Much human error or failure can be prevented with training and ongoing awareness activities.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True

No comments:

Post a Comment