Filters
Question type

Study Flashcards

___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) All of these

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hackers
B) Black-hat hackers
C) Crackers
D) Cyberterrorists

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The most common type of defense within detection and response technologies is _________ software.

Correct Answer

verifed

verified

What is social engineering?


A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.

Correct Answer

verifed

verified

Which of the following is not one of the five steps for creating an information security plan?


A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) None of these

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Correct Answer

verifed

verified

___________ attack computer systems by transmitting a virus hoax,with a real virus attached.

Correct Answer

verifed

verified

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

Correct Answer

verifed

verified

___________ is a method for confirming users' identities.

Correct Answer

verifed

verified

A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

Who works at the request of the system owners to find system vulnerabilities and plug the holes?


A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Who breaks into other people's computer systems and just looks around or steals and destroys information?


A) White-hat hacker
B) Black-hat hacker
C) Hactivist
D) Script kiddies

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

A(n)_________ is software written with malicious intent to cause annoyance or damage.

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are people very knowle...

View Answer

Which of the following can be completed by encryption?


A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What identifies the rules required to maintain information security?


A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

What floods a website with so many requests for service that it slows down or crashes the site?


A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 76

Related Exams

Show Answer