Testbacksecurity

Only available on StudyMode
  • Download(s) : 272
  • Published : March 31, 2013
Open Document
Text Preview
Chapter 2 - Why Security is Needed

TRUE/FALSE

1.Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs.

ANS:FPTS:1

2.Information security safeguards the technology assets in use at the organization.

ANS:TPTS:1

3.A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.

ANS:TPTS:1

4.An act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “forces of nature.”

ANS:FPTS:1

5.Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.

ANS:FPTS:1

6.A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.

ANS:TPTS:1

7.A worm requires that another program is running before it can begin functioning.

ANS:FPTS:1

8.A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

ANS:TPTS:1

9.Attacks conducted by scripts are usually unpredictable.

ANS:FPTS:1

10.Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.

ANS:TPTS:1

11.With the removal of copyright protection, software can be easily distributed and installed.

ANS:TPTS:1

12.Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.

ANS:TPTS:1

13.Much human error or failure can be prevented with training and ongoing awareness activities.

ANS:TPTS:1

14.Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.

ANS:FPTS:1

15.With electronic information is stolen, the crime is readily apparent.

ANS:FPTS:1

16.Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.

ANS:TPTS:1

17.DoS attacks cannot be launched against routers.

ANS:FPTS:1

18.A mail bomb is a form of DoS.

ANS:TPTS:1

19.A sniffer program shows all the data going by on a network segment including passwords, the data inside files—such as word-processing documents—and screens full of sensitive data from applications.

ANS:TPTS:1

20.A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms.

ANS:TPTS:1

MODIFIED TRUE/FALSE

1.Intellectual property is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas.” _________________________

ANS:TPTS:1

2.The macro virus infects the key operating system files located in a computer’s boot sector. _________________________

ANS:F, boot

PTS:1

3.Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________

ANS:F
virus
worm

PTS:1

4.A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________

ANS:TPTS:1

5.When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________

ANS:F, spike

PTS:1

6.The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking...
tracking img