Preview

Final Exam Paper

Satisfactory Essays
Open Document
Open Document
491 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Final Exam Paper
1. The principal goal of the information security program should be to ______.
Answer: ensure that systems and their contents remain the same.

2. Information security has more to do with _____ than with _____
Answer: management, technology

3. True or False: Many organizations find that their most valuable asset is their data.
Answer: True

4. True or False: A computer worm consists of segments of code that perform malicious actions.
Answer: True

5. ____ are hackers of limited skill who use expertly written software to attack a system
Answer: Unskilled Hackers

6. ____ occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose
…show more content…
Insider trading
d. Information hording
Answer: A

7. ____ hack systems to conduct terrorist activities via network or Internet pathways.
a. Cyberhackers
b. Electronic terrorists
c. Cyberterrorists
d. Electronic hackers
Answer: C

8. True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.
Answer: True

9. ______ is the illegal taking of another’s property, which can be physical, electronic, or intellectual.
Answer: Deliberate acts of theft

10. A(n) attack is an act that exploits a(n) ______.
Answer: Vulnerability in a controlled system

11. True or False: Warnings of attacks that are not valid are usually called hoaxes.
Answer: True

12. Using a known or previously installed access mechanism is called using a _____.
a. hidden bomb
b. vector
c. spoof
d. back door
Answer: D

13. When a program tries using all commonly used passwords, this is known as a(n) ______.
Answer: Dictionary attack

14. True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof.
Answer: Password crack

15. Another name for TCP hijacking is _____.
a. man-in-the-middle
b. mail bombing
c.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.…

    • 1397 Words
    • 6 Pages
    Better Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    2. ____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission. a. Spoofing c. Phishing b. Unauthorized access d. Vandalizing 3. ____ refers to the act of breaking into a computer or network. a. Spamming c. Hacking b. Phishing d. Spoofing 4. Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them. a. spoofing c. spamming b. phishing d. war driving 5. ____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems. a. Touch object c. Two-factor b. Possessed object d. Biometric 6. A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access. a. Trojan horse c. hub b. firewall d. bridge 7. ____ uses a single secret key to both encrypt and decrypt the file or message. a. Private key encryption c. Public key encryption b. Asymmetric key encryption d. Synchronous key encryption 8. Some Web-based encrypted e-mail system, such as the popular free ____ service梤 equire both the sender and recipient to have accounts through that system. a. CryptMail c. HushMail b. QuietMail d. PrivateMail…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Courtroom Matrix

    • 474 Words
    • 2 Pages

    | When a crime is committed against them and they or someone else reports the crime committed against them.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Final Exam Paper

    • 1545 Words
    • 7 Pages

    A.Interest in business ethics began in the 1960s as researchers surveyed managers’ attitudes toward business ethics.…

    • 1545 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Lab 8 Student

    • 2441 Words
    • 15 Pages

    Step 1: Imagine a program that calls for the user to enter a password of at least 8 alphanumeric characters. Identify at least two potential input errors.…

    • 2441 Words
    • 15 Pages
    Good Essays
  • Good Essays

    4. Each of the following is a successive layer in which information security is achieved except _______.…

    • 3457 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Homework CH 1 Java

    • 723 Words
    • 5 Pages

    2. Languages that let you use a vocabulary of descriptive terms, such as read, write, or…

    • 723 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Student Name: Shumayem Khan Date: 11/10/15 ENG 208: Public Speaking Dr. Aghasi Informative/Persuasive Speech Preparation Outline Victims of Identity Theft General Purpose: To inform. Specific Purpose: To inform my audience of how you could become a victim of identity theft and ways in which you could prevent it. Central Idea: If we learn more about identity theft we may be able to prevent it from happening, as there is a huge possibility that many of us are victims of identity theft and are still not aware of it.…

    • 1346 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Credit Card Fraud

    • 1919 Words
    • 8 Pages

    The fraud begins mostly in two ways, either by the theft of the corporeal card or by the negotiation of data related with the account including all the information. The compromise can occur by many common routes and one of the ways which’s typically used is warning the card holder, until the account is ultimately used for fraud. Here’s an example where a store clerk is copying sales receipts so he can use them later. Using credit card on internet…

    • 1919 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Computer Hacking

    • 2402 Words
    • 10 Pages

    technology hacker-free, which is not plausible. All this does is provide the hacker with more assentive to figure out how to get around it. The growth of technology causes new threats and new problems. The consequences hackers face can be extremely severe, or minimal if lucky. Many “elite” hackers get off with minimum consequences such as probation. Sometimes, on rare occasions, if the hacker is skilled enough, the FBI will drop their sentence as long as they agree to work undercover for them. Hackers thrive for a challenge; many of them hack just to see if they can actually achieve it. In today’s society, people are becoming more and more reliant on technology, causing the hacker industry to rise. Despite “professional” opinions, every piece of technology has a weak point.…

    • 2402 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cryptographic Attacks

    • 1743 Words
    • 7 Pages

    attempts to find a matching plaintext. This can be done with a decryption oracle (a…

    • 1743 Words
    • 7 Pages
    Good Essays

Related Topics