Chapter1 Flashcards
True or false:
The first step in solving problems is to gather facts and make assumptions.
False
True or False:
Corruption of information can occur only while information is being stored.
False
True/False
The authorization process takes place before the authentication process
False
True/False
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
True
True/False
DoS attacks cannot be launched against routers.
False
True/False
“Shoulder spying” is used in public or semi-public settings when individuals gather information, they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. _________________________
Fasle-surfing
True/False
When voltage levels** lag** (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________
False- Spike
True/False
The macro virus infects the key operating system files located in a computer’s start up sector. _________________________
False- boot
True/False
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________
False- Bruteforce
True/False
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________
False- Cracker
True/False
A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. ________________________
True
True/False
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________
True
True/False
A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. ____________
False- Packet
True/False
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________
False -Bomb
Communications security involves the protection of which of the following?
a. radio handsets
b. people, physical assets
c. the IT department
d. media, technology, and content
d. Media,technology, and content
According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? a. accountability
b. availability
c. authorization
d. authentication
b- availability
Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information? a. Integrity b. Availability c. Authentication d. Confidentiality
d - Confidentiality
The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?
a. accountability
b. authorization
c. identification
d. authentication
d - authentication
What do audit logs that track user activity on an information system provide?
a. identification
b. authorization
c. accountability
d. authentication
c - accountability
Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives?
a. leading
b. controlling
c. organizing
d. planning
d -Planning
Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? a. organization b. planning c. controlling d. leading
a -organization
In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. a. zombie-in-the-middle b. sniff-in-the-middle c. server-in-the-middle d. man-in-the-middle
d -man-in-the-middle
Which of the following is the first step in the problem-solving process? a. Analyze and compare the possible solutions. b. Develop possible solutions. c. Recognize and define the problem. d. Select, implement, and evaluate a solution
c -Recognize and define
Which of the following is NOT a step in the problem-solving process? a. Select, implement and evaluate a solution b. Analyze and compare possible solutions c. Build support among management for the candidate solution d. Gather facts and make assumptions
c - build support among management for the candidate solution