30 Questions
Organizations do not need to consider business impact when addressing information security.
False
Once infrastructure is in place, management should no longer oversee it.
False
Data protection only involves safeguarding data at rest.
False
Enforcement of copyright law is not related to technical security mechanisms.
False
Malware includes viruses, worms, trojan horses, and adware, but not logic bombs.
False
The two organizations that investigate software abuse are the Software and Information Industry Association (SIIA) and Business Software Alliance (BSA).
True
Deviation in the quality of service can be caused by internet service provider (ISP) failures.
True
Outsourced web hosting providers are not responsible for managing Internet services or hardware.
False
Loss of utility services like telephone and water cannot affect an organization's ability to function.
False
Organizations with inadequately conditioned power are less susceptible to power irregularities.
False
Shoulder surfing is a method used by hackers to bypass security controls.
True
Espionage involves legally accessing protected information by authorized individuals.
False
An expert hacker usually possesses a wide range of skills and will often create attack software to share with others.
True
Unskilled hackers are less common compared to expert hackers.
False
Crackers are individuals who aim to enhance software protection against unauthorized duplication.
False
Phreakers are individuals who manipulate the public telephone network through hacking.
True
Forces of nature can disrupt not only individual lives but also the storage, transmission, and use of information.
True
Human error or failure in organizations can result from malicious intent and deliberate actions.
False
Hoaxes involve executing viruses, worms, and trojan horses to steal information.
False
Malicious Code includes the execution of active web scripts with intent to destroy or steal information.
True
Back Door refers to attempting to reverse calculate a password.
False
Dictionary attack involves selecting specific accounts to attack and using commonly used passwords for guessing.
True
Brute Force tries every possible combination of options for a password.
True
Marfil is an extension of the Aircrack-ng suite used for network security assessment.
True
Man-in-the-Center is a cybersecurity attack where the attacker assumes a trusted IP address.
False
Mail bombing is a technique where an attacker sends large quantities of physical mails to the target.
False
Pharming redirects legitimate Web traffic to legitimate sites to obtain private information.
False
Spoofing is a cybersecurity technique used to gain unauthorized access to systems.
True
Denial-of-Service (DoS) attacks occur when an attacker sends a large number of legitimate service requests to a target.
False
Social Engineering aims to steal private information by accessing network data packets.
False
Explore the characteristics and skills of different types of hackers, from traditional to expert and unskilled hackers. Learn about their profiles and activities in the world of cybersecurity.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free