Information Security ch.2
An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.
False
The primary mission of information security is to ensure that systems and their content retain their confidentiality.
False
With the removal of copyright protection mechanisms, software can be easily and legally distributed and installed.
False
The average amount of time until the next hardware failure is known as _____.
Mean time to failure (MTTF)
A table of hash values and their corresponding plaintext values used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) _____.
Rainbow table
_____ is any technology that aids in gathering information about a person or organization without their knowledge.
Spyware
The _____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
TCP
Technical mechanisms like digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media have been used to deter or prevent the theft of software intellectual property.
True
Human error or failure often can be prevented with training, ongoing awareness activities, and _____.
controls
A short-term interruption in electrical power availability is known as a _____.
fault
