Chapter 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

social engineering

"4-1-9" fraud is an example of a ____________________ attack.

distributed denial-of-service

A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

blackout

A long-term interruption (outage) in electrical power availability is known as a(n) ___________.

fault

A short-term interruption in electrical power availability is known as a ____.

rainbow table

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.

trespass

Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

hoaxes

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.

novice

Hackers can be generalized into two skill groups: expert and ____________

education

Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.

denial-of-service

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

man-in-the-middle

In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

256

Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ____________________ characters in Internet Explorer 4.0, the browser will crash.

hacktivist

One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.

SAM

The ____________________ data file contains the hashed representation of the user's password.

TCP

The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

mean time between failure (MTBF)

The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.

mean time to failure (MTTF)

The average amount of time until the next hardware failure is known as __________.

database

The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.

pharming

The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as __________.

SLA

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.

industrial espionage

When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting __________.

All of the above

Which of the following functions does information security perform for an organization?

Happy99.exe

Which of the following is an example of a Trojan horse program?

Spyware

____ is any technology that aids in gathering information about a person or organization without their knowledge.

Zombies

____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

Trojan horses

____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

cyberterrorism

____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.

brownout

short-term decrease in electrical power availability is known as a(n) ________


Set pelajaran terkait

Psychology Exam 3 Book Questions

View Set

AD Banker Ch.15 - Ethics and Law

View Set

2023 State Insurance Statutes, Rules, and Regulations

View Set

American Government: Reading Quiz 2

View Set