Module 2 Exam - The Need for Information Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is an example of a Trojan horse program?

Happy99.exe

The ______ data file contains the hashed representation of the user's password.

SAM

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.

SLA

____ is any technology that aids in gathering information about a person or organization without their knowledge.

Spyware

The ______ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

TCP

______ are malware programs that hide their true nature and reveal their designed behavior only when activated.

Trojan horses

______ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

Zombies

A ______ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

distributed denial-of-service

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized have by looking over another individual's shoulder or viewing the information from a distance.

false

A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer.

false

A worm requires that another program is running before it can begin functioning.

false

An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.

false

Attacks conducted by scripts are usually unpredictable.

false

Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.

false

DoS attacks cannot be launched against routers.

false

Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.

false

Media are items of fact collected by an organization and include raw numbers, facts, and words.

false

Media assets are the focus of information security and are the information that has value to the organization, as well the systems that store, process, and transmit the information.

false

Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system.

false

One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receive with excessive quantities of e-mail.

false

Packet munchkins use automated exploits to engage in distributed denial-of-service attacks.

false

Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay discovery. The first is obviously in the category of "theft" but the second act is another category—in this case it is a "force of nature."

false

The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack.

false

The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.

false

Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).

false

When electronic information is stolen, the crime is readily apparent.

false

When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment.

false

A short-term interruption in electrical power availability is known as a ____.

fault

One form of online vandalism is ______ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.

hacktivist

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ______.

hoaxes

When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting ______.

industrial espionage

In the ______ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back the network.

man-in-the-middle

The average amount of time between hardware failures, calculated as the total amount of operation time for a specific number of units divided by the total number of failures, is known as ______.

mean time between failure (MTBF)

The average amount of time until the next hardware failure is known as ______.

mean time to failure (MTTF)

Hackers can be generalized into two skill groups: expert and ______.

novice

The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as ______.

pharming

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attack is able to steal a system's encrypted password file is known as a(n) ______.

rainbow table

Advance-Fee fraud is an example of a ______ attack.

social engineering

Acts of ______ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

trespass

A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intention placement of bad sectors on software media—have been used to deter or prevent the theft of software intellectual property.

true

A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attach files—such as word-processing documents—and sensitive data transmitted to or from applications.

true

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users subsequently visit those sites become infected.

true

A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.

true

An e-mail bomb is a form of DoS attack.

true

As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.

true

Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break in other people's information systems.

true

Forces of nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with very little warning and are beyond the control of people.

true

Hackers are "persons who access systems and information without authorization and often illegally."

true

Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas."

true

Media as a subset of information assets are the systems and networks that store, process, and transmit information.

true

Much human error or failure can be prevented with effective training and ongoing awareness activities.

true

Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.

true

Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites.

true

The information security function in an organization safeguards its technology assets.

true

The macro virus infects the key operating system files located in a computer's start-up sector.

true

The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the in to destroy or steal information.

true

With the removal of copyright protection mechanisms, software can be easily and illegally distributed and installed.

true

Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ______ character Internet Explorer 4.0, the browser will crash.

256

Which of the following functions does information security perform for an organization?

All of the above. (Protecting the organization's ability to function., Enabling the safe operation of applications implemented on the organization's IT systems., Protecting the data the organization collects and uses.)

A long-term interruption (outage) in electrical power availability is known as a(n) ______.

blackout

Human error or failure often can be prevented with training, ongoing awareness activities, and______.

controls

______ is the premeditated, politically motivated attacks against information, computer systems, computer programs, data that result in violence against noncombatant targets by subnational groups or clandestine agents.

cyberterrorism

The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as _____ security.

database

In a ______ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

denial-of-service


Set pelajaran terkait

Chapter 20 Quiz Questions, MKT 300 Exam 3- Ch. 12, Chapter 19 Marketing Final, MKT321_CH20, Chap 19 Practice Questions, Foundations of Marketing Ch. 15, Mktg chapter 15, TAMU MKTG 321 Chapter 15 (Retailing, Direct Marketing, and Wholesaling) - Dr. La...

View Set

Review Questions for Chapter 27 Fluid, Electrolyte, and Acid-Base Balance for Anatomy and Physiology

View Set

Constitution Test: Executive Branch

View Set