Filters
Question type

Study Flashcards

The three common core goals of security are ________.


A) confidentiality, integrity, and availability
B) confidentiality, information, and availability
C) confidentiality, integrity, and authentication
D) confidentiality, information, and authorization

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Most cookies are dangerous.

A) True
B) False

Correct Answer

verifed

verified

False

________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer.)


A) Social engineering
B) Spam
C) E-mail attachment
D) Mobile code

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Attackers rarely use IP address spoofing to conceal their identities.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets.


A) virus
B) directly-propagating worm
C) DoS
D) bot

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Social engineering is rarely used in hacking.

A) True
B) False

Correct Answer

verifed

verified

The definition of hacking is "intentionally accessing a computer resource without authorization or in excess of authorization."

A) True
B) False

Correct Answer

verifed

verified

Confidentiality means that attackers cannot change or destroy information.

A) True
B) False

Correct Answer

verifed

verified

What type of employee is the most dangerous when it comes to internal IT attacks?


A) Data entry clerks
B) Financial professionals
C) IT professionals
D) IT security professionals

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Watching someone type their password in order to learn the password is called ________.


A) piggybacking
B) shoulder surfing
C) Both A and B
D) Neither A nor B

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

B

Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.

A) True
B) False

Correct Answer

verifed

verified

The terms "intellectual property" and "trade secret" are synonymous.

A) True
B) False

Correct Answer

verifed

verified

Compared to non-computer crime, computer crime is very small.

A) True
B) False

Correct Answer

verifed

verified

Which of the following can be a type of spyware?


A) A cookie
B) A keystroke logger
C) Both A and B
D) Neither A nor B

E) None of the above
F) All of the above

Correct Answer

verifed

verified

About how long was the Sony PlayStation Network offline as a result of the cyber attacks?


A) 3 days
B) 3 weeks
C) 3 months
D) It never went down.

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

The primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open.

A) True
B) False

Correct Answer

verifed

verified

False

Preventative countermeasures identify when a threat is attacking and especially when it is succeeding.

A) True
B) False

Correct Answer

verifed

verified

In a virus, the code that does damage is called the ________.


A) exploit
B) compromise
C) payload
D) vector

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

When a threat succeeds in causing harm to a business, this is called a ________.


A) breach
B) compromise
C) incident
D) All of the above

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Money mules transfer stolen money for criminals and take a small percentage for themselves.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 103

Related Exams

Show Answer