Filters
Question type

Study Flashcards

The average amount of time until the next hardware failure is known as __________.


A)  ​​mean time between failure (MTBF)   
B)  ​mean time to diagnose (MTTD)  
C)  ​mean time to failure (MTTF)  
D)  ​mean time to repair (MTTR)

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.


A)  database 
B)  data 
C)  information 
D)  residual

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A

Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________

A) True
B) False

Correct Answer

verifed

verified

_________ is the percentage of time a particular service is available.

Correct Answer

verifed

verified

​uptime up-time up time​

Hackers can be generalized into two skill groups: expert and ____________________.


A)  novice
B)  journeyman 
C)  packet monkey
D)  professional

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Script ____________________ are hackers of limited skill who use expertly written software to attack a system.

Correct Answer

verifed

verified

When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________

A) True
B) False

Correct Answer

verifed

verified

A short-term interruption in electrical power availability is known as a ____.


A)  ​fault
B)  ​brownout 
C)  ​blackout
D)  ​lag

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The ____________________ fraud is a social engineering attack that involves convincing the victim to participate in a seeming money-making venture while getting the victim to pay fees or bribes or to refund uncleared international payments.

Correct Answer

verifed

verified

advance-fe...

View Answer

Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).

A) True
B) False

Correct Answer

verifed

verified

A computer virus consists of segments of code that perform ____________________ actions.

Correct Answer

verifed

verified

__________ occurs when an application running on a Web server inserts commands into a user's browser session and causes information to be sent to a hostile server.

Correct Answer

verifed

verified

cross-site scripting (XSS) cro...

View Answer

Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________

A) True
B) False

Correct Answer

verifed

verified

Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________

A) True
B) False

Correct Answer

verifed

verified

True

Media are items of fact collected by an organization and include raw numbers, facts, and words.

A) True
B) False

Correct Answer

verifed

verified

Describe viruses and worms.

Correct Answer

verifed

verified

A computer virus consists of segments of...

View Answer

A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.


A)  denial-of-service
B)  distributed denial-of-service 
C)  virus
D)  spam

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ____________________ characters in Internet Explorer 4.0, the browser will crash.


A)  64 
B)  128 
C)  256 
D)  512

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

The macro virus infects the key operating system files located in a computer's start-up sector. _________________________

A) True
B) False

Correct Answer

verifed

verified

One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.


A)  hacktivist
B)  phreak 
C)  hackcyber
D)  cyberhack

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 91

Related Exams

Show Answer