Filters
Question type

Study Flashcards

A ____________ overflow is an application error that occurs when the system can't handle the amount of data that is sent.

Correct Answer

verifed

verified

Which type of attack involves sending a large number of connection or information requests to a target?


A) malicious code
B) denial-of-service (DoS)
C) brute force
D) spear fishing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A ____________________is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.


A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Discuss the planning element of information security.

Correct Answer

verifed

verified

Planning in InfoSec management is an ext...

View Answer

Corruption of information can occur only while information is being stored.

A) True
B) False

Correct Answer

verifed

verified

False

ESD is the acronym for ____________________ discharge.

Correct Answer

verifed

verified

A momentary low voltage is called a(n)____________________.

Correct Answer

verifed

verified

What is authentication?Provide some examples.

Correct Answer

verifed

verified

Authentication is the process by which a...

View Answer

What do audit logs that track user activity on an information system provide?


A) identification
B) authorization
C) accountability
D) authentication

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

In the____________________attack,an attacker monitors (or sniffs) packets from the network,modifies them,and inserts them back into the network.


A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

DoS attacks cannot be launched against routers.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the principle of management that develops,creates,and implements strategies for the accomplishment of objectives?


A) leading
B) controlling
C) organizing
D) planning

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

D

List themeasures that are commonly used to protect the confidentiality of information.

Correct Answer

verifed

verified

Information classification
Se...

View Answer

There are 12 general categories of threat to an organization's people,information,and systems.List at least six of the general categories of threat and identify at least one example of those listed.

Correct Answer

verifed

verified

Compromises to intellectual property
So...

View Answer

One form of e-mail attack that is also a DoS attack is called a mail spoof,in which an attacker overwhelms the receiver with excessive quantities of e-mail._________________________

A) True
B) False

Correct Answer

verifed

verified

The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?


A) accountability
B) authorization
C) identification
D) authentication

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

List and explain the four principles of management under the contemporary or popular management theory.Briefly define each.

Correct Answer

verifed

verified

Popular management theory,which categori...

View Answer

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance._________________________

A) True
B) False

Correct Answer

verifed

verified

Communications security involves the protection of which of the following?.


A) radio handsets
B) people, physical assets
C) the IT department
D) media, technology, and content

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

____________________are malware programs that hide their true nature,and reveal their designed behavior only when activated.


A) Viruses
B) Worms
C) Spam
D) Trojan horses

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

D

Showing 1 - 20 of 63

Related Exams

Show Answer