Ch 2 Test

Ace your homework & exams now with Quizwiz!

One form of online vandalism is ________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. A) Phreak B) Hacktivist C) Cyberhack D) Hackcyber

B) Hacktivist

Which of the following is an example of a Trojan horse program? A) Klez B) Happy99.exe C) MyDoom D) Netsky

B) Happy99.exe

________ are malware programs that hide their true nature, and reveal their designed behavior only when activated. A) Viruses B) Worms C) Trojan Horses D) Spam

C) Trojan Horses

Which of the following functions does information security perform for an organization? A) Protecting the organization's ability to function B) Enabling the safe operation of applications implemented on the organization's IT systems C) Protecting the data the organization collects and uses D) All of the above

D) All of the above

In a ___________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources. A) Distributed denial-of-service B) Virus C) Spam D) Denial-of-service

D) Denial-of-service

True or False: "Shoulder *spying*" is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.

False

True or False: An advance-free fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.

False

True or False: Attacks conducted by scripts are usually unpredictable.

False

True or False: DoS attacks cannot be launched against routers.

False

True or False: The application of computing and network resources to try every possible combination of options of a password is called a *dictionary* attack.

False

True or false: An act of theft performed by a hacker falls into the category of "theft," but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of "forces of nature."

False

True or False: *Cyberterrorists* hack systems to conduct terrorist activities via network or Internet pathways.

True

True or False: A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to deter or prevent the theft of software intellectual property.

True

True or False: A sniffer program can reveal data transmitted on a network segment including passwords, the embedded and attached files - such as word-processing documents - and sensitive data transmitted to or from applications.

True

True or False: A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

True

True or False: As an organization grows it must often use more robust technology to replace the security technologies it may have outgrown

True

True or False: Software code known as a *cookie* can allow an attacker to track a victim's activity on Web sites.

True

True or False: With the removal of copyright protection mechanisms, software can be easily distributed and installed.

True

______ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents. A) Cyberterrorism B)Hacking C) Infoterrorism D) Cracking

A) Cyberterrorism

A _______ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A) Distributed Denial-of-Service B) Virus C) Denial-of-Service D) Spam

A) Distributed Denial-of-Service


Related study sets

DECA Communication Skills Performance Indicators

View Set

Adult Health Exam 3 LaCharity delegation Practice questions

View Set

Lakota Unit 48-7 (Partitives: haŋké, húŋȟ)

View Set

F4 Manon des Sources-Vocabulaire (100% français)

View Set

SPAN 203: CHAPTER 1 HW ASSIGNMENTS

View Set