Filters
Question type

A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.

Correct Answer

verifed

verified

​A short-term decrease in electrical power availability is known as a(n) ___________.


A) ​blackout
B) ​sag
C) ​brownout
D) ​fault

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.


A) mean time between failure (MTBF)
B) mean time to diagnose (MTTD)
C) mean time to failure (MTTF)
D) mean time to repair (MTTR)

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ____________________ is an act against an asset that could result in a loss.

Correct Answer

verifed

verified

attack

A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.

Correct Answer

verifed

verified

When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.

Correct Answer

verifed

verified

espionage

Describe viruses and worms.

Correct Answer

verifed

verified

A computer virus consists of segments of...

View Answer

_________ is the percentage of time a particular service is available.

Correct Answer

verifed

verified

​uptime
up...

View Answer

In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.

Correct Answer

verifed

verified

The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as __________.


A) pharming
B) phishing
C) sniffing
D) pharming

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

ESD is the acronym for ____________________ discharge.

Correct Answer

verifed

verified

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.


A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A

The expert hacker sometimes is called a(n) ____________________ hacker.

Correct Answer

verifed

verified

When electronic information is stolen, the crime is readily apparent.

A) True
B) False

Correct Answer

verifed

verified

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.


A) SSL
B) SLA
C) MSL
D) MIN

E) None of the above
F) All of the above

Correct Answer

verifed

verified

As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.

A) True
B) False

Correct Answer

verifed

verified

Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.

A) True
B) False

Correct Answer

verifed

verified

Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an example of a Trojan horse program?


A) Netsky
B) MyDoom
C) Klez
D) Happy99.exe

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The ____________________ data file contains the hashed representation of the user's password.


A) SLA
B) SNMP
C) FBI
D) SAM

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 91

Related Exams

Show Answer