Question 1
With the theft of electronic information, the evidence of a crime is readily apparent.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 2
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.Selected Answer: 
 man-in-the-middleCorrect Answer: 
 man-in-the-middleQuestion 3
A(n) ____________________ is an object, person, or other entity that represents a constant danger to an asset.Selected Answer: 
 threat agentCorrect Answer: Evaluation Method Correct Answer Case Sensitivity 
Exact Matchthreat 
Exact Matchthreat agent Question 4
The term phreaker is now commonly associated with an individual who “cracks” or removes software protection that is designed to prevent unauthorized duplication.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 5
A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.Selected Answer: 
 distributed denial-of-serviceCorrect Answer: 
 distributed denial-of-serviceQuestion 6
____ are software programs that hide their true nature, and reveal their designed behavior only when activated.Selected Answer: 
 Trojan horsesCorrect Answer: 
 Trojan horsesQuestion 7
____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.Selected Answer: 
 CyberterrorismCorrect Answer: 
 CyberterrorismQuestion 8
A mail bomb is a form of DoS.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 9
Within the context of information security, __________ is the process of using interpersonal skills to convince people to reveal access credentials or other valuable information to the attacker.Selected Answer: 
 social engineeringCorrect Answer: 
 social engineeringQuestion 10
A(n) __________ is an identified weakness in a controlled system, where controls are not present or are no longer effectiveSelected Answer: 
 vulnerabilityCorrect Answer: 
 vulnerabilityQuestion 11
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.Selected Answer: 
 ZombiesCorrect Answer: 
 ZombiesQuestion 12
A(n) ____________________ is an act or action that takes advantage of a vulnerability to compromise a controlled system.Selected Answer: 
 attackCorrect Answer: Evaluation Method Correct Answer Case Sensitivity 
Exact Matchattack 
Exact Matchexploit Question 13
A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication.Selected Answer: 
 wormCorrect Answer: Evaluation Method Correct Answer Case Sensitivity 
Exact Matchworm Question 14
A firewall is a device that keeps certain kinds of network traffic out of a private network.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 15
Much human error or failure can be prevented with training and ongoing awareness activities.Selected Answer: 
 TrueCorrect Answer: 
 True
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH2
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment