A computer virus consists of segments of code that perform ____________________ actions.
  • False
  • Phreaker
  • Malicious
  • kiddies
A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.
  • True
  • False
When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.
  • Espionage
  • False
  • Piracy
  • Phreaker
The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.
  • True
  • False
A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
  • Phreaker
  • Spyware
  • Worm
  • Hoaxes
A(n) ____________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.
  • Buffer Overrun or Buffer Overflow
  • Trojan Horses
  • Vulnerability
  • Phreaker
____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
  • Phreaker
  • Spoofing
  • Spam
  • Cracking
Much human error or failure can be prevented with training and ongoing awareness activities.
  • True
  • False
A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
  • True
  • False
A(n) ____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle.
  • True
  • Buffer Overrun or Buffer Overflow
  • Spam
  • False
Which of the following functions does information security perform for an organization?
  • Elite
  • Protecting the organization's ability to function, Enabling the safe operation of applications implemented on the organization's IT systems, and Protecting the data the organization collects and uses.
  • Malicious
  • Novice
An act of theft performed by a hacker falls into the category of "theft," but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of "forces of nature."
  • True
  • False
A worm requires that another program is running before it can begin functioning.
  • True
  • False
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
  • True
  • False
A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.
  • True
  • False
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
  • True
  • False
Attacks conducted by scripts are usually unpredictable.
  • True
  • False
A momentary low voltage is called a(n) ____________________.
  • SLA
  • Cracking
  • False
  • Sag
Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system.
  • True
  • False
A(n) ____________________ is an act that takes advantage of a vulnerability to compromise a controlled system.
  • Man-In-The-Middle
  • Attack
  • Worm
  • True
A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
  • Back
  • False
  • True
  • Piracy
A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment.
  • Vulnerability
  • Worm
  • Phreaker
  • True
ESD means electrostatic ____________________.
  • Spyware
  • Discharge
  • False
  • Cracking
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker routes large quantities of e-mail to the target.
  • True
  • False
Complete loss of power for a moment is known as a ____.
  • Sag
  • Fault
  • True
  • False
There are generally two skill levels among hackers: expert and ____.
  • Novice
  • Elite
  • Cracking
  • False
The macro virus infects the key operating system files located in a computer's boot sector.
  • True
  • False
Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.
  • Social Engineering
  • Intelligence
  • True
  • Vulnerability
____________________ is unsolicited commercial e-mail.
  • Sag
  • Worm
  • Spyware
  • Spam
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0, the browser will crash.
  • True
  • False
  • Worm
  • 256
With electronic information is stolen, the crime is readily apparent.
  • True
  • False
With the removal of copyright protection, software can be easily distributed and installed.
  • True
  • False
When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
  • True
  • False
Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers.
  • True
  • False
Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways.
  • True
  • False
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.
  • True
  • False
According to Mark Pollitt, ____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.
  • Vulnerability
  • Social Engineering
  • Cyberterrorism
  • Intelligence
Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.
  • False
  • SLA
  • Cracking
  • True
A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms.
  • True
  • False
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____.
  • Hoaxes
  • Spyware
  • kiddies
  • False
Attempting to reverse-calculate a password is called ____________________.
  • Piracy
  • Phreaker
  • Cracking
  • Novice
Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.
  • True
  • False
The ____ data file contains the hashed representation of the user's password.
  • False
  • Fault
  • SAM
  • Elite
Intellectual property is defined as "the ownership of ideas and control over the tangible or virtual representation of those ideas."
  • True
  • False
Information security safeguards the technology assets in use at the organization.
  • True
  • False
Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
  • True
  • False
The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack.
  • True
  • False
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
  • Malicious
  • Hacktivist
  • False
  • Espionage
Packet kiddies use automated exploits to engage in distributed denial-of-service attacks.
  • True
  • False
Hackers are "people who use and create computer software to gain access to information illegally."
  • True
  • False
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
  • Vulnerability
  • Espionage
  • Trojan Horses
  • Trespass
Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.
  • True
  • False
The timing attack explores the contents of a Web browser's ____________________.
  • False
  • TCP
  • Cache
  • True
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0