Computer Hardware

Only available on StudyMode
  • Download(s) : 868
  • Published : September 19, 2012
Open Document
Text Preview
1.The principal goal of the information security program should be to ______. Answer: ensure that systems and their contents remain the same.

2.Information security has more to do with _____ than with _____ Answer: management, technology

3.True or False: Many organizations find that their most valuable asset is their data. Answer: True

4.True or False: A computer worm consists of segments of code that perform malicious actions. Answer: True

5.____ are hackers of limited skill who use expertly written software to attack a system Answer: Unskilled Hackers

6.____ occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. a.Information extortion

b.Technological extortion
c.Insider trading
d.Information hording
Answer: A

7.____ hack systems to conduct terrorist activities via network or Internet pathways. a.Cyberhackers
b.Electronic terrorists
d.Electronic hackers
Answer: C

8.True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo. Answer: True

9.______ is the illegal taking of another’s property, which can be physical, electronic, or intellectual. Answer: Deliberate acts of theft

10.A(n) attack is an act that exploits a(n) ______.
Answer: Vulnerability in a controlled system

11.True or False: Warnings of attacks that are not valid are usually called hoaxes. Answer: True

12.Using a known or previously installed access mechanism is called using a _____. a.hidden bomb
d.back door
Answer: D

13.When a program tries using all commonly used passwords, this is known as a(n) ______. Answer: Dictionary attack

14.True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof. Answer: Password crack

15.Another name for TCP hijacking is...
tracking img