Chapter 2 CYB 155 Exam
The ____________________ data file contains the hashed representation of the user's password.
SAM
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.
SLA
Which of the following functions does information security perform for an organization?
all of the above
Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.
education
"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. _________________________
false
A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. _________________________
false
A worm requires that another program is running before it can begin functioning.
false
An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.
false
Attacks conducted by scripts are usually unpredictable.
false
Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.
false
Computer assets are the focus of information security and are the information that has value to the organization, as well as the systems that store, process, and transmit the information.
false
DoS attacks cannot be launched against routers. Group of answer choices
false
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.
false
Media are items of fact collected by an organization and include raw numbers, facts, and words.
false
Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________
false
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________
false
Packet munchkins use automated exploits to engage in distributed denial-of-service attacks. _________________________
false
Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay discovery. The first act is obviously in the category of "theft" but the second act is another category—in this case it is a "force of nature."
false
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________ Group of answer choices
false
The macro virus infects the key operating system files located in a computer's start-up sector. _________________________
false
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________
false
Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).
false
When electronic information is stolen, the crime is readily apparent.
false
When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________
false
A short-term interruption in electrical power availability is known as a ____.
fault
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
hacktivist
Hackers can be generalized into two skill groups: expert and ____________________.
novice
"4-1-9" fraud is an example of a ____________________ attack.
social engineering
____ is any technology that aids in gathering information about a person or organization without their knowledge.
spyware
Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
trespass
____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.
trojan horses
A mail bomb is a form of DoS attack.
true
A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to deter or prevent the theft of software intellectual property.
true
A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files—such as word-processing documents—and sensitive data transmitted to or from applications.
true
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
true
A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________
true
As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.
true
Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________
true
Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.
true
Forces of nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with very little warning and are beyond the control of people.
true
Hackers are "persons who access systems and information without authorization and often illegally." _________________________
true
Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________
true
Media as a subset of information assets are the systems and networks that store, process, and transmit information.
true
Much human error or failure can be prevented with effective training and ongoing awareness activities.
true
Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.
true
Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________
true
The information security function in an organization safeguards its technology assets.
true
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________ Group of answer choices
true
With the removal of copyright protection mechanisms, software can be easily distributed and installed.
true
