Computer Hardware

Topics: World Wide Web, Computer, Uniform Resource Locator Pages: 3 (501 words) Published: September 19, 2012
1.The principal goal of the information security program should be to ______. Answer: ensure that systems and their contents remain the same.

2.Information security has more to do with _____ than with _____ Answer: management, technology

3.True or False: Many organizations find that their most valuable asset is their data. Answer: True

4.True or False: A computer worm consists of segments of code that perform malicious actions. Answer: True

5.____ are hackers of limited skill who use expertly written software to attack a system Answer: Unskilled Hackers

6.____ occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. a.Information extortion

b.Technological extortion
c.Insider trading
d.Information hording
Answer: A

7.____ hack systems to conduct terrorist activities via network or Internet pathways. a.Cyberhackers
b.Electronic terrorists
c.Cyberterrorists
d.Electronic hackers
Answer: C

8.True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo. Answer: True

9.______ is the illegal taking of another’s property, which can be physical, electronic, or intellectual. Answer: Deliberate acts of theft

10.A(n) attack is an act that exploits a(n) ______.
Answer: Vulnerability in a controlled system

11.True or False: Warnings of attacks that are not valid are usually called hoaxes. Answer: True

12.Using a known or previously installed access mechanism is called using a _____. a.hidden bomb
b.vector
c.spoof
d.back door
Answer: D

13.When a program tries using all commonly used passwords, this is known as a(n) ______. Answer: Dictionary attack

14.True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof. Answer: Password crack

15.Another name for TCP hijacking is...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Hal's Hardware Essay
  • Seminar Topics on Computer Research Paper
  • Ace Hardware Store Entering Bahrain Market Essay
  • HEFTY HARDWARE CASE STUDY Essay
  • Computer Hardware Essay
  • Essay about Troubleshooting Computer Hardware Appendix B
  • Computer vs. Paper Tasks
  • Computer Hardware Essay

Become a StudyMode Member

Sign Up - It's Free