CIST 1601 Chapter 2
Compared to Web site defacement, vandalism within a network is less malicious in intent and more public. True False
False
Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA). True False
False
The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security. a. data b. information c. residual d. database
database
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources. a. denial-of-service b. virus c. spam d. distributed denial-of-service
denial-of-service
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. a. cyberhack b. phreak c. hackcyber d. hacktivist
hacktivist
In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. a. man-in-the-middle b. zombie-in-the-middle c. sniff-in-the-middle d. server-in-the-middle
man-in-the-middle
Hackers can be generalized into two skill groups: expert and ____________________. a. packet monkey b. journeyman c. professional d. novice
novice
A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________. a. dictionary b. crack file c. crib d. rainbow table
rainbow table
The ____________________ data file contains the hashed representation of the user's password. a. FBI b. SAM c. SLA d. SNMP
SAM
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. a. SSL b. MSL c. SLA d. MIN
SLA
____ is any technology that aids in gathering information about a person or organization without their knowledge. a. Spyware b. A worm c. A bot d. A Trojan
Spyware
The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. a. FTP b. HTTP c. TCP d. WWW
TCP
As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown. True False
True
Much human error or failure can be prevented with effective training and ongoing awareness activities. True False
True
With the removal of copyright protection mechanisms, software can be easily distributed and installed. True False
True
