Filters
Question type

Study Flashcards

As frustrating as viruses and worms are,perhaps more time and money is spent on resolving virus ____.


A) false alarms
B) power faults
C) hoaxes
D) urban legends

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Compared to Web site defacement,vandalism within a network is less malicious in intent and more public.

A) True
B) False

Correct Answer

verifed

verified

A momentary low voltage is called a(n)____________________.

Correct Answer

verifed

verified

A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms.

A) True
B) False

Correct Answer

verifed

verified

A(n)____________________ is an identified weakness in a controlled system,where controls are not present or are no longer effective.

Correct Answer

verifed

verified

With the removal of copyright protection,software can be easily distributed and installed.

A) True
B) False

Correct Answer

verifed

verified

A(n)cookie can allow an attacker to collect information on how to access password-protected sites._________________________

A) True
B) False

Correct Answer

verifed

verified

Duplication of software-based intellectual property is more commonly known as software ____________________.

Correct Answer

verifed

verified

A number of technical mechanisms-digital watermarks and embedded code,copyright codes,and even the intentional placement of bad sectors on software media-have been used to enforce copyright laws.

A) True
B) False

Correct Answer

verifed

verified

According to Mark Pollitt,____ is the premeditated,politically motivated attacks against information,computer systems,computer programs,and data which result in violence against noncombatant targets by subnational groups or clandestine agents.


A) infoterrorism
B) cyberterrorism
C) hacking
D) cracking

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A sniffer program shows all the data going by on a network segment including passwords,the data inside files-such as word-processing documents-and screens full of sensitive data from applications.

A) True
B) False

Correct Answer

verifed

verified

Describe the capabilities of a sniffer.

Correct Answer

verifed

verified

A sniffer is a program or device that ca...

View Answer

A(n)____________________ is an act that takes advantage of a vulnerability to compromise a controlled system.

Correct Answer

verifed

verified

____ are software programs that hide their true nature,and reveal their designed behavior only when activated.


A) Viruses
B) Worms
C) Spam
D) Trojan horses

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

When voltage levels surge (experience a momentary increase),the extra voltage can severely damage or destroy equipment._________________________

A) True
B) False

Correct Answer

verifed

verified

Complete loss of power for a moment is known as a ____.


A) sag
B) fault
C) brownout
D) blackout

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

A(n)____________________ is a malicious program that replicates itself constantly,without requiring another program environment.

Correct Answer

verifed

verified

____ is an integrated system of software,encryption methodologies,and legal agreements that can be used to support the entire information infrastructure of an organization.


A) SSL
B) PKI
C) PKC
D) SIS

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.


A) SSL
B) SLA
C) MSL
D) MIN

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A worm can deposit copies of itself onto all Web servers that the infected system can reach,so that users who subsequently visit those sites become infected.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 78

Related Exams

Show Answer