Filters
Question type

____ is any technology that aids in gathering information about a person or organization without their knowledge.


A) A bot
B) Spyware
C) A Trojan
D) A worm

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.

A) True
B) False

Correct Answer

verifed

verified

Packet munchkins use automated exploits to engage in distributed denial-of-service attacks. _________________________

A) True
B) False

Correct Answer

verifed

verified

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.


A) rainbow table
B) dictionary
C) crib
D) crack file

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Forces of nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with very little warning and are beyond the control of people.

A) True
B) False

Correct Answer

verifed

verified

When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting __________.


A) industrial espionage
B) competitive intelligence
C) opposition research
D) hostile investigation

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A(n) ____________________ is a potential weakness in an asset or its defensive control(s).

Correct Answer

verifed

verified

Which of the following functions does information security perform for an organization?


A) Protecting the organization's ability to function.
B) Enabling the safe operation of applications implemented on the organization's IT systems.
C) Protecting the data the organization collects and uses.
D) All of the above.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.

A) True
B) False

Correct Answer

verifed

verified

"4-1-9" fraud is an example of a ____________________ attack.


A) social engineering
B) virus
C) worm
D) spam

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

DoS attacks cannot be launched against routers.

A) True
B) False

Correct Answer

verifed

verified

Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.

A) True
B) False

Correct Answer

verifed

verified

There are 12 general categories of threat to an organization's people, information, and systems. List at least six of the general categories of threat and identify at least one example of those listed.

Correct Answer

verifed

verified

Compromises to intellectual property
Sof...

View Answer

A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. _________________________

A) True
B) False

Correct Answer

verifed

verified

A number of technical mechanisms-digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media-have been used to deter or prevent the theft of software intellectual property.

A) True
B) False

Correct Answer

verifed

verified

Hackers are "persons who access systems and information without authorization and often illegally." _________________________

A) True
B) False

Correct Answer

verifed

verified

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.


A) false alarms
B) polymorphisms
C) hoaxes
D) urban legends

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.


A) infoterrorism
B) cyberterrorism
C) hacking
D) cracking

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________

A) True
B) False

Correct Answer

verifed

verified

____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.


A) Viruses
B) Worms
C) Spam
D) Trojan horses

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 60 of 91

Related Exams

Show Answer