Question 1
With the theft of electronic information, the evidence of a crime is readily apparent.Selected Answer:
FalseCorrect Answer:
FalseQuestion 2
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.Selected Answer:
man-in-the-middleCorrect Answer:
man-in-the-middleQuestion 3
A(n) ____________________ is an object, person, or other entity that represents a constant danger to an asset.Selected Answer:
threat agentCorrect Answer: Evaluation Method Correct Answer Case Sensitivity
Exact Matchthreat
Exact Matchthreat agent Question 4
The term phreaker is now commonly associated with an individual who “cracks” or removes software protection that is designed to prevent unauthorized duplication.Selected Answer:
FalseCorrect Answer:
FalseQuestion 5
A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.Selected Answer:
distributed denial-of-serviceCorrect Answer:
distributed denial-of-serviceQuestion 6
____ are software programs that hide their true nature, and reveal their designed behavior only when activated.Selected Answer:
Trojan horsesCorrect Answer:
Trojan horsesQuestion 7
____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.Selected Answer:
CyberterrorismCorrect Answer:
CyberterrorismQuestion 8
A mail bomb is a form of DoS.Selected Answer:
TrueCorrect Answer:
TrueQuestion 9
Within the context of information security, __________ is the process of using interpersonal skills to convince people to reveal access credentials or other valuable information to the attacker.Selected Answer:
social engineeringCorrect Answer:
social engineeringQuestion 10
A(n) __________ is an identified weakness in a controlled system, where controls are not present or are no longer effectiveSelected Answer:
vulnerabilityCorrect Answer:
vulnerabilityQuestion 11
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.Selected Answer:
ZombiesCorrect Answer:
ZombiesQuestion 12
A(n) ____________________ is an act or action that takes advantage of a vulnerability to compromise a controlled system.Selected Answer:
attackCorrect Answer: Evaluation Method Correct Answer Case Sensitivity
Exact Matchattack
Exact Matchexploit Question 13
A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication.Selected Answer:
wormCorrect Answer: Evaluation Method Correct Answer Case Sensitivity
Exact Matchworm Question 14
A firewall is a device that keeps certain kinds of network traffic out of a private network.Selected Answer:
TrueCorrect Answer:
TrueQuestion 15
Much human error or failure can be prevented with training and ongoing awareness activities.Selected Answer:
TrueCorrect Answer:
True
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH2
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment