Answer: ensure that systems and their contents remain the same.
2. Information security has more to do with _____ than with _____
Answer: management, technology
3. True or False: Many organizations find that their most valuable asset is their data.
Answer: True
4. True or False: A computer worm consists of segments of code that perform malicious actions.
Answer: True
5. ____ are hackers of limited skill who use expertly written software to attack a system
Answer: Unskilled Hackers
6. ____ occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose …show more content…
Insider trading
d. Information hording
Answer: A
7. ____ hack systems to conduct terrorist activities via network or Internet pathways.
a. Cyberhackers
b. Electronic terrorists
c. Cyberterrorists
d. Electronic hackers
Answer: C
8. True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.
Answer: True
9. ______ is the illegal taking of another’s property, which can be physical, electronic, or intellectual.
Answer: Deliberate acts of theft
10. A(n) attack is an act that exploits a(n) ______.
Answer: Vulnerability in a controlled system
11. True or False: Warnings of attacks that are not valid are usually called hoaxes.
Answer: True
12. Using a known or previously installed access mechanism is called using a _____.
a. hidden bomb
b. vector
c. spoof
d. back door
Answer: D
13. When a program tries using all commonly used passwords, this is known as a(n) ______.
Answer: Dictionary attack
14. True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof.
Answer: Password crack
15. Another name for TCP hijacking is _____.
a. man-in-the-middle
b. mail bombing
c.