Tuesday, January 7, 2020
Ch1 Comp Security - 2287 Words
Chapter 1: Introduction to Information Security TRUE/FALSE 1. An indirect attack involves a hacker using a personal computer to break into a system. ANS: F PTS: 1 REF: 3 2. The value of information comes from the characteristics it possesses. ANS: T PTS: 1 REF: 6 3. By balancing information security and access, a completely secure information system can be created. ANS: F PTS: 1 REF: 8 4. The security blueprint is a detailed version of the security framework. ANS: T PTS: 1 REF: 25 5. One of the basic tenets of security architectures is the spheres of security. ANS: F PTS: 1 REF: 30 MULTIPLE CHOICE 1. Which term describes a subject or objectââ¬â¢s ability to use, manipulate, modify, or affect anotherâ⬠¦show more contentâ⬠¦a.|linear|c.|graphical| b.|triangular|d.|semantic| ANS: C PTS: 1 REF: 8 9. Which individual interferes with or disrupts systems to protest the operations, policies, or actions of an organization or government agency? a.|Cyberterrorist|c.|Phreaker| b.|Packet monkey|d.|Hacktivist| ANS: D PTS: 1 REF: 11 10. Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service? a.|Cyberterrorist|c.|Phreaker| b.|Packet monkey|d.|Hacktivist| ANS: B PTS: 1 REF: 12 11. Which threat is the most common intellectual property (IP) breach? a.|Software piracy|c.|Shoulder surfing| b.|Spoofing|d.|Password cracking| ANS: A PTS: 1 REF: 12 12. Which attack is used when a copy of the hash of the userââ¬â¢s password has been obtained? a.|Rainbow attack|c.|Dictionary attack| b.|Brute force attack|d.|Spoofing| ANS: A PTS: 1 REF: 13 13. Which e-mail attack occurs when an attacker routes large quantities of e-mail to the target system? a.|Buffer overflow|c.|Spam| b.|Mail bomb|d.|Timing attack| ANS: B PTS: 1 REF: 16 14. A(n) ____ is an application error that occurs when more data is sent to a buffer than it can handle. a.|timing attack|c.|dictionary attack| b.|application control list|d.|buffer overflow| ANS: D PTS: 1 REF:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.