Chapter 1 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a brownout?

A long-term reduction in quality of service

What is a Trojan Horse?

A malware program that hides its true nature and reveals its designed behavior only when activated

A denial-of-service (DoS) attack is

An attack that attempts to overwhelm a computer target's ability to handle incoming communications, prohibiting legitimate users from accessing those systems

What vocabulary word is defined as: the process by which a control establishes whether a usr (or system) is the entity it claims to be?

Authentication

The CIA triad consists of all of the following except...

Authorization

What term is described as "The access control mechanism that requires the validation and verification of unauthorized entity's purported identity"?

Authorization

Which of the following is not one of the threat categories?

Authorization

Blackouts, faults, and spikes deal with which part of the CIA triad

Availability

Of the three characteristics of the C.I.A. Triad, the one that means users, either people or other systems, have access to it in a usable format.

Availability

Which of the following falls under the CIA triad?

Availability

A malware payload that provides access to a system by bypassing normal access controls left by the system designer to facilitate development best describes what word?

Back Door

A long term failure of an electrical power supply is a ______.

Blackout

A DECREASE in the power voltage levels is called

Brownout

When someone is attempting to guess a password by attempting every possible combination of characters and numbers in it, this is an example of

Brute Force Password Attack

Which of the following is NOT part of CIA triad?

Classification

Which of the following is NOT one of the three pillars of InfoSec?

Communications Security

Piracy is what kind of threat to information security?

Compromise of intellectual property

What does the "c" stand for in the CIA Triad?

Confidentiality

An individual who is trying to crack a password by using every word in the English language would use this strategy.

Dictionary Attack

A natural threat to information security, such as a tornado or earthquake, can be referred to as what?

Force of Nature Act of God Force majeure All of the Above

Which of the following threat categories cannot be prevented through a computer?

Forces of Nature

FIG is an acronym for which three hacker motivations?

Fun, Ideology, Grudge

What is one of the weakest layers of security in Cybersecurity?

Human Layer

What is one of the communities of interest discussed in the text?

Information Security community

The measures taken to protect the confidentiality of information according to the C.I.A. triad includes all of the following except:

Information extortion

Which of the following is not a part of the CIA Triad?

Intelligence

Which of the following is the most true regarding Information Security (InfoSec)?

It is the responsibility of all employees and managers

What type of security protects the voice and data networking components, connections, and content?

Network Security

Which of the following is NOT one of the three levels of planning?

Organizational Planning

If you become victim to ransomware, you should do all of the following except.

Pay the ransom

Which is the weakest part of information security

People

Which of the following requires the user to actively click on the link?

Phishing

What is the process of creating designs or schemes for future efforts or performance called?

Planning

A short term decrease in electrical power availability is

Sag

What is a hacker of limited skill who uses expertly written software to attack a system called?

Script Kiddie

Which is an example of a "good" hacker?

Security Researcher

Which of the following forms of hacking is considered "goog"?

Security Researcher

Which is NOT one of the 12 Categories of Threats to information security?

Software Illness

What kind of planning occurs at the highest levels of the organization and for a long period of time, usually five or more years?

Strategic planning

The IT Community

Supports the business objectives of the organization by supporting IT that is appropriate to the organization's needs

Which statement about "brute force" is true?

The application of computing and network resources to try every possible password combination.

Cybersecurity is:

The protection of computerized information processing systems and the data they contain and process

This is the illegal act taking of another's property, which can be physical, electronic, or intellectual.

Theft

A malware program that hides its true nature and reveals its designed behavior only when activated is the definition for which term?

Trojan horse

Which of the following is a movie about a computer guru who accidentally found himself launching an attack on the United States?

Wargames

Stuxnet, a malware that spread from computer to computer, is an example of what type of malware

Worm


Ensembles d'études connexes

Chapter 5. Data Types, Variables, and Arithmetic

View Set

Stats Chapter 6: Continuous Probability Distributions

View Set

Juv Justice & Delinquency- Mindtap & Slido

View Set

scientific reasoning final review - homework questions; dr.hershey

View Set