2.Information security has more to do with _____ than with _____ Answer: management, technology
3.True or False: Many organizations find that their most valuable asset is their data. Answer: True
4.True or False: A computer worm consists of segments of code that perform malicious actions. Answer: True
5.____ are hackers of limited skill who use expertly written software to attack a system Answer: Unskilled Hackers
6.____ occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. a.Information extortion
7.____ hack systems to conduct terrorist activities via network or Internet pathways. a.Cyberhackers
8.True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo. Answer: True
9.______ is the illegal taking of another’s property, which can be physical, electronic, or intellectual. Answer: Deliberate acts of theft
10.A(n) attack is an act that exploits a(n) ______.
Answer: Vulnerability in a controlled system
11.True or False: Warnings of attacks that are not valid are usually called hoaxes. Answer: True
12.Using a known or previously installed access mechanism is called using a _____. a.hidden bomb
13.When a program tries using all commonly used passwords, this is known as a(n) ______. Answer: Dictionary attack
14.True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof. Answer: Password crack
15.Another name for TCP hijacking is...