CIST 1601 Chapter 2

Ace your homework & exams now with Quizwiz!

Compared to Web site defacement, vandalism within a network is less malicious in intent and more public. True False

False

Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA). True False

False

The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security. a. data b. information c. residual d. database

database

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources. a. denial-of-service b. virus c. spam d. distributed denial-of-service

denial-of-service

One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. a. cyberhack b. phreak c. hackcyber d. hacktivist

hacktivist

In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. a. man-in-the-middle b. zombie-in-the-middle c. sniff-in-the-middle d. server-in-the-middle

man-in-the-middle

Hackers can be generalized into two skill groups: expert and ____________________. a. packet monkey b. journeyman c. professional d. novice

novice

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________. a. dictionary b. crack file c. crib d. rainbow table

rainbow table

The ____________________ data file contains the hashed representation of the user's password. a. FBI b. SAM c. SLA d. SNMP

SAM

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. a. SSL b. MSL c. SLA d. MIN

SLA

____ is any technology that aids in gathering information about a person or organization without their knowledge. a. Spyware b. A worm c. A bot d. A Trojan

Spyware

The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. a. FTP b. HTTP c. TCP d. WWW

TCP

As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown. True False

True

Much human error or failure can be prevented with effective training and ongoing awareness activities. True False

True

With the removal of copyright protection mechanisms, software can be easily distributed and installed. True False

True


Related study sets

PY-221-01 (Psych of Learning) Exam 1 (for final)

View Set

Pediatrics: Hematology/oncology questions

View Set

The Formation of the Old Testament

View Set

Business Law II - Chapter 28 Bankruptcy

View Set

Trademarks & Publicity Rights Test

View Set

Chapter 14 - An Introduction to Host Defenses

View Set