Filters
Question type

Study Flashcards

Much human error or failure can be prevented with effective training and ongoing awareness activities.

A) True
B) False

Correct Answer

verifed

verified

When electronic information is stolen, the crime is readily apparent.

A) True
B) False

Correct Answer

verifed

verified

The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________

A) True
B) False

Correct Answer

verifed

verified

"4-1-9" fraud is an example of a ____________________ attack.


A)  social engineering
B)  virus 
C)  worm
D)  spam

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ____________________ is a potential risk to an information asset.

Correct Answer

verifed

verified

A worm requires that another program is running before it can begin functioning.

A) True
B) False

Correct Answer

verifed

verified

The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.


A)  WWW
B)  TCP 
C)  FTP
D)  HTTP

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Describe the capabilities of a sniffer.

Correct Answer

verifed

verified

A sniffer is a program or device that ca...

View Answer

Which of the following functions does information security perform for an organization  


A)  Protecting the organization's ability to function. 
B)  Enabling the safe operation of applications implemented on the organization's IT systems. 
C)  Protecting the data the organization collects and uses. 
D)  All of the above.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

____  is any technology that aids in gathering information about a person or organization without their knowledge.


A)  A bot
B)  Spyware 
C)  A Trojan
D)  A worm

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A mail bomb is a form of DoS attack.

A) True
B) False

Correct Answer

verifed

verified

Some information gathering techniques are quite legal-for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.

Correct Answer

verifed

verified

Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.


A)  threats
B)  education 
C)  hugs
D)  paperwork

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.


A)  denial-of-service
B)  distributed denial-of-service 
C)  virus
D)  spam

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

A(n) ____________________ is a potential weakness in an asset or its defensive control(s).

Correct Answer

verifed

verified

The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________

A) True
B) False

Correct Answer

verifed

verified

One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________

A) True
B) False

Correct Answer

verifed

verified

Media as a subset of information assets are the systems and networks that store, process, and transmit information.

A) True
B) False

Correct Answer

verifed

verified

____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.


A)  Viruses
B)  Worms 
C)  Spam
D)  Trojan horses

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 91

Related Exams

Show Answer