Information Security ch.2

Ace your homework & exams now with Quizwiz!

An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.

False

The primary mission of information security is to ensure that systems and their content retain their confidentiality.

False

With the removal of copyright protection mechanisms, software can be easily and legally distributed and installed.

False

The average amount of time until the next hardware failure is known as _____.

Mean time to failure (MTTF)

A table of hash values and their corresponding plaintext values used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) _____.

Rainbow table

_____ is any technology that aids in gathering information about a person or organization without their knowledge.

Spyware

The _____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

TCP

Technical mechanisms like digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media have been used to deter or prevent the theft of software intellectual property.

True

Human error or failure often can be prevented with training, ongoing awareness activities, and _____.

controls

A short-term interruption in electrical power availability is known as a _____.

fault


Related study sets

Apex Learning 4.3.2 Quiz Review CCR

View Set

BB 314- Unit 6 Cytoskeleton Quiz

View Set

Chapter 44: PrepU - Nursing Management: Patients With Oncologic Disorders of the Brain and Spinal Cord

View Set

Entrepreneurship ( 1st Quarter WITH HONORS)

View Set

Bio 110- Ch 6 Cellular Respiration

View Set

To an Inconstant One - AP Multiple Choice Answers

View Set