MIS: Chapter 10 Video: Information Security Management
Based on the information provided in this video, which of the following describes an attack in which a hacker floods a Web server with so many requests that it becomes unavailable to its intended users?
denial-of-service
Based on the information provided in this video, what is the single largest threat to the availability of the Internet?
denial-of-service attacks
According to the DHS agent portrayed in this video, which of the following best describes the activity of a phisher?
masquerading as a trustworthy entity
According to the Agent Macy, which of the following describes an attack in which an unauthorized user gains access to an unprotected network?
sniffing
According to the DHS agent portrayed in this video, when discussing computer information security, APT is the acronym for _____.
advanced persistent threat