Podcast
Questions and Answers
Organizations do not need to consider business impact when addressing information security.
Organizations do not need to consider business impact when addressing information security.
False (B)
Once infrastructure is in place, management should no longer oversee it.
Once infrastructure is in place, management should no longer oversee it.
False (B)
Data protection only involves safeguarding data at rest.
Data protection only involves safeguarding data at rest.
False (B)
Enforcement of copyright law is not related to technical security mechanisms.
Enforcement of copyright law is not related to technical security mechanisms.
Malware includes viruses, worms, trojan horses, and adware, but not logic bombs.
Malware includes viruses, worms, trojan horses, and adware, but not logic bombs.
The two organizations that investigate software abuse are the Software and Information Industry Association (SIIA) and Business Software Alliance (BSA).
The two organizations that investigate software abuse are the Software and Information Industry Association (SIIA) and Business Software Alliance (BSA).
Deviation in the quality of service can be caused by internet service provider (ISP) failures.
Deviation in the quality of service can be caused by internet service provider (ISP) failures.
Outsourced web hosting providers are not responsible for managing Internet services or hardware.
Outsourced web hosting providers are not responsible for managing Internet services or hardware.
Loss of utility services like telephone and water cannot affect an organization's ability to function.
Loss of utility services like telephone and water cannot affect an organization's ability to function.
Organizations with inadequately conditioned power are less susceptible to power irregularities.
Organizations with inadequately conditioned power are less susceptible to power irregularities.
Shoulder surfing is a method used by hackers to bypass security controls.
Shoulder surfing is a method used by hackers to bypass security controls.
Espionage involves legally accessing protected information by authorized individuals.
Espionage involves legally accessing protected information by authorized individuals.
An expert hacker usually possesses a wide range of skills and will often create attack software to share with others.
An expert hacker usually possesses a wide range of skills and will often create attack software to share with others.
Unskilled hackers are less common compared to expert hackers.
Unskilled hackers are less common compared to expert hackers.
Crackers are individuals who aim to enhance software protection against unauthorized duplication.
Crackers are individuals who aim to enhance software protection against unauthorized duplication.
Phreakers are individuals who manipulate the public telephone network through hacking.
Phreakers are individuals who manipulate the public telephone network through hacking.
Forces of nature can disrupt not only individual lives but also the storage, transmission, and use of information.
Forces of nature can disrupt not only individual lives but also the storage, transmission, and use of information.
Human error or failure in organizations can result from malicious intent and deliberate actions.
Human error or failure in organizations can result from malicious intent and deliberate actions.
Hoaxes involve executing viruses, worms, and trojan horses to steal information.
Hoaxes involve executing viruses, worms, and trojan horses to steal information.
Malicious Code includes the execution of active web scripts with intent to destroy or steal information.
Malicious Code includes the execution of active web scripts with intent to destroy or steal information.
Back Door refers to attempting to reverse calculate a password.
Back Door refers to attempting to reverse calculate a password.
Dictionary attack involves selecting specific accounts to attack and using commonly used passwords for guessing.
Dictionary attack involves selecting specific accounts to attack and using commonly used passwords for guessing.
Brute Force tries every possible combination of options for a password.
Brute Force tries every possible combination of options for a password.
Marfil is an extension of the Aircrack-ng suite used for network security assessment.
Marfil is an extension of the Aircrack-ng suite used for network security assessment.
Man-in-the-Center is a cybersecurity attack where the attacker assumes a trusted IP address.
Man-in-the-Center is a cybersecurity attack where the attacker assumes a trusted IP address.
Mail bombing is a technique where an attacker sends large quantities of physical mails to the target.
Mail bombing is a technique where an attacker sends large quantities of physical mails to the target.
Pharming redirects legitimate Web traffic to legitimate sites to obtain private information.
Pharming redirects legitimate Web traffic to legitimate sites to obtain private information.
Spoofing is a cybersecurity technique used to gain unauthorized access to systems.
Spoofing is a cybersecurity technique used to gain unauthorized access to systems.
Denial-of-Service (DoS) attacks occur when an attacker sends a large number of legitimate service requests to a target.
Denial-of-Service (DoS) attacks occur when an attacker sends a large number of legitimate service requests to a target.
Social Engineering aims to steal private information by accessing network data packets.
Social Engineering aims to steal private information by accessing network data packets.
Flashcards are hidden until you start studying