Chapter 2
social engineering
"4-1-9" fraud is an example of a ____________________ attack.
distributed denial-of-service
A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
blackout
A long-term interruption (outage) in electrical power availability is known as a(n) ___________.
fault
A short-term interruption in electrical power availability is known as a ____.
rainbow table
A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.
trespass
Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
hoaxes
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.
novice
Hackers can be generalized into two skill groups: expert and ____________
education
Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.
denial-of-service
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.
man-in-the-middle
In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
256
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ____________________ characters in Internet Explorer 4.0, the browser will crash.
hacktivist
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
SAM
The ____________________ data file contains the hashed representation of the user's password.
TCP
The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
mean time between failure (MTBF)
The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.
mean time to failure (MTTF)
The average amount of time until the next hardware failure is known as __________.
database
The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.
pharming
The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as __________.
SLA
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.
industrial espionage
When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting __________.
All of the above
Which of the following functions does information security perform for an organization?
Happy99.exe
Which of the following is an example of a Trojan horse program?
Spyware
____ is any technology that aids in gathering information about a person or organization without their knowledge.
Zombies
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
Trojan horses
____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.
cyberterrorism
____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.
brownout
short-term decrease in electrical power availability is known as a(n) ________
