Filters
Question type

Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.


A) bypass
B) theft
C) trespass
D) security

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).

A) True
B) False

Correct Answer

verifed

verified

One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.


A) hacktivist
B) phreak
C) hackcyber
D) cyberhack

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________

A) True
B) False

Correct Answer

verifed

verified

A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files-such as word-processing documents-and sensitive data transmitted to or from applications.

A) True
B) False

Correct Answer

verifed

verified

__________ occurs when an application running on a Web server inserts commands into a user's browser session and causes information to be sent to a hostile server.

Correct Answer

verifed

verified

cross-site scripting (XSS)
cro...

View Answer

Script ____________________ are hackers of limited skill who use expertly written software to attack a system.

Correct Answer

verifed

verified

Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.


A) threats
B) education
C) hugs
D) paperwork

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A(n) ____________________ is a potential risk to an information asset.

Correct Answer

verifed

verified

Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay discovery. The first act is obviously in the category of "theft" but the second act is another category-in this case it is a "force of nature."

A) True
B) False

Correct Answer

verifed

verified

One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________

A) True
B) False

Correct Answer

verifed

verified

Describe the capabilities of a sniffer.

Correct Answer

verifed

verified

A sniffer is a program or device that ca...

View Answer

The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.


A) database
B) data
C) information
D) residual

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Computer assets are the focus of information security and are the information that has value to the organization, as well as the systems that store, process, and transmit the information. ____________

A) True
B) False

Correct Answer

verifed

verified

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. _________________________

A) True
B) False

Correct Answer

verifed

verified

____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

Correct Answer

verifed

verified

A(n) ____________________ is a malicious program that replicates itself constantly without requiring another program environment.

Correct Answer

verifed

verified

A computer virus consists of segments of code that perform ____________________ actions.

Correct Answer

verifed

verified

A short-term interruption in electrical power availability is known as a ____.


A) ​fault
B) ​brownout
C) ​blackout
D) ​lag

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Media as a subset of information assets are the systems and networks that store, process, and transmit information.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 91

Related Exams

Show Answer