Chapter 1 Quiz
What is a brownout?
A long-term reduction in quality of service
What is a Trojan Horse?
A malware program that hides its true nature and reveals its designed behavior only when activated
A denial-of-service (DoS) attack is
An attack that attempts to overwhelm a computer target's ability to handle incoming communications, prohibiting legitimate users from accessing those systems
What vocabulary word is defined as: the process by which a control establishes whether a usr (or system) is the entity it claims to be?
Authentication
The CIA triad consists of all of the following except...
Authorization
What term is described as "The access control mechanism that requires the validation and verification of unauthorized entity's purported identity"?
Authorization
Which of the following is not one of the threat categories?
Authorization
Blackouts, faults, and spikes deal with which part of the CIA triad
Availability
Of the three characteristics of the C.I.A. Triad, the one that means users, either people or other systems, have access to it in a usable format.
Availability
Which of the following falls under the CIA triad?
Availability
A malware payload that provides access to a system by bypassing normal access controls left by the system designer to facilitate development best describes what word?
Back Door
A long term failure of an electrical power supply is a ______.
Blackout
A DECREASE in the power voltage levels is called
Brownout
When someone is attempting to guess a password by attempting every possible combination of characters and numbers in it, this is an example of
Brute Force Password Attack
Which of the following is NOT part of CIA triad?
Classification
Which of the following is NOT one of the three pillars of InfoSec?
Communications Security
Piracy is what kind of threat to information security?
Compromise of intellectual property
What does the "c" stand for in the CIA Triad?
Confidentiality
An individual who is trying to crack a password by using every word in the English language would use this strategy.
Dictionary Attack
A natural threat to information security, such as a tornado or earthquake, can be referred to as what?
Force of Nature Act of God Force majeure All of the Above
Which of the following threat categories cannot be prevented through a computer?
Forces of Nature
FIG is an acronym for which three hacker motivations?
Fun, Ideology, Grudge
What is one of the weakest layers of security in Cybersecurity?
Human Layer
What is one of the communities of interest discussed in the text?
Information Security community
The measures taken to protect the confidentiality of information according to the C.I.A. triad includes all of the following except:
Information extortion
Which of the following is not a part of the CIA Triad?
Intelligence
Which of the following is the most true regarding Information Security (InfoSec)?
It is the responsibility of all employees and managers
What type of security protects the voice and data networking components, connections, and content?
Network Security
Which of the following is NOT one of the three levels of planning?
Organizational Planning
If you become victim to ransomware, you should do all of the following except.
Pay the ransom
Which is the weakest part of information security
People
Which of the following requires the user to actively click on the link?
Phishing
What is the process of creating designs or schemes for future efforts or performance called?
Planning
A short term decrease in electrical power availability is
Sag
What is a hacker of limited skill who uses expertly written software to attack a system called?
Script Kiddie
Which is an example of a "good" hacker?
Security Researcher
Which of the following forms of hacking is considered "goog"?
Security Researcher
Which is NOT one of the 12 Categories of Threats to information security?
Software Illness
What kind of planning occurs at the highest levels of the organization and for a long period of time, usually five or more years?
Strategic planning
The IT Community
Supports the business objectives of the organization by supporting IT that is appropriate to the organization's needs
Which statement about "brute force" is true?
The application of computing and network resources to try every possible password combination.
Cybersecurity is:
The protection of computerized information processing systems and the data they contain and process
This is the illegal act taking of another's property, which can be physical, electronic, or intellectual.
Theft
A malware program that hides its true nature and reveals its designed behavior only when activated is the definition for which term?
Trojan horse
Which of the following is a movie about a computer guru who accidentally found himself launching an attack on the United States?
Wargames
Stuxnet, a malware that spread from computer to computer, is an example of what type of malware
Worm