Quiz: Module 02 The Need for Security

Ace your homework & exams now with Quizwiz!

Technical mechanisms like digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media have been used to deter or prevent the theft of software intellectual property. a. True b. False

true

_____ is any technology that aids in gathering information about a person or organization without their knowledge. a. Spyware b. A worm c. A bot d. A Trojan

a. Spyware

The _____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. a. TCP b. FTP c. WWW d. HTTP

a. TCP

The average amount of time until the next hardware failure is known as _____. a. mean time to failure (MTTF) b. mean time between failure (MTBF) c. mean time to diagnose (MTTD) d. mean time to repair (MTTR)

a. mean time to failure (MTTF)

Human error or failure often can be prevented with training, ongoing awareness activities, and _____. a. paperwork b. controls c. hugs d. threats

b. controls

A short-term interruption in electrical power availability is known as a _____. a. brownout b. lag c. fault d. blackout

c. fault

A table of hash values and their corresponding plaintext values used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) _____. a. crack file b. dictionary c. crib d. rainbow table

d. rainbow table

An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms. a. True b. False

false

The primary mission of information security is to ensure that systems and their content retain their confidentiality. a. True b. False

false

With the removal of copyright protection mechanisms, software can be easily and legally distributed and installed. a. True b. False

false


Related study sets

Environmental Policy Midterm- Dr. King

View Set

Assignment: Chapter 02: F. Sentence Faults

View Set

Chapter 3: Vectors and Coordinate Systems

View Set

Adult Development & Aging Exam 2

View Set