Deck 2: The Need for Security

Full screen (f)
exit full mode
Question
A number of technical mechanisms-digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media-have been used to deter or prevent the theft of software intellectual property.
Use Space or
up arrow
down arrow
to flip the card.
Question
With the removal of copyright protection mechanisms, software can be easily distributed and installed.
Question
The information security function in an organization safeguards its technology assets.
Question
Forces of nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with very little warning and are beyond the control of people.
Question
DoS attacks cannot be launched against routers.
Question
A worm requires that another program is running before it can begin functioning.
Question
Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.
Question
Much human error or failure can be prevented with effective training and ongoing awareness activities.
Question
Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay discovery. The first act is obviously in the category of  "theft" but the second act is another category-in this case it is a "force of nature." 
Question
An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.
Question
When electronic information is stolen, the crime is readily apparent.
Question
Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.
Question
A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files-such as word-processing documents-and sensitive data transmitted to or from applications.
Question
Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.
Question
Attacks conducted by scripts are usually unpredictable.
Question
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
Question
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.
Question
As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.
Question
A mail bomb is a form of DoS attack.
Question
Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).
Question
Computer assets are the focus of information security and are the information that has value to theorganization, as well as the systems that store, process, and transmit the information. ____________
Question
"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. _________________________
Question
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.

A) SSL
B) SLA 
C) MSL
D) MIN
Question
Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________
Question
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________
Question
Media as a subset of information assets are the systems and networks that store, process, and transmit information.
Question
A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________
Question
Hackers are "persons who access systems and information without authorization and often illegally." _________________________
Question
Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________
Question
Which of the following functions does information security perform for an organization  

A) Protecting the organization's ability to function. 
B) Enabling the safe operation of applications implemented on the organization's IT systems. 
C) Protecting the data the organization collects and uses. 
D) All of the above.
Question
When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________
Question
Packet munchkins use automated exploits to engage in distributed denial-of-service attacks. _________________________
Question
Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________
Question
The macro virus infects the key operating system files located in a computer's start-up sector. _________________________
Question
Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________
Question
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________
Question
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________
Question
A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. _________________________
Question
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________
Question
Media are items of fact collected by an organization and include raw numbers, facts, and words.
Question
____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

A) Viruses
B) Worms 
C) Spam
D) Trojan horses
Question
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

A) denial-of-service
B) distributed denial-of-service 
C) virus
D) spam
Question
A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

A) denial-of-service
B) distributed denial-of-service 
C) virus
D) spam
Question
____  is any technology that aids in gathering information about a person or organization without their knowledge.

A) A bot
B) Spyware 
C) A Trojan
D) A worm
Question
Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.

A) threats
B) education 
C) hugs
D) paperwork
Question
____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.

A) infoterrorism
B) cyberterrorism 
C) hacking
D) cracking
Question
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ____________________ characters in Internet Explorer 4.0, the browser will crash.

A) 64 
B) 128 
C) 256 
D) 512
Question
Hackers can be generalized into two skill groups: expert and ____________________.

A) novice
B) journeyman 
C) packet monkey
D) professional
Question
In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

A) zombie-in-the-middle
B) sniff-in-the-middle 
C) server-in-the-middle
D) man-in-the-middle
Question
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.

A) false alarms
B) polymorphisms 
C) hoaxes
D) urban legends
Question
Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

A) bypass
B) theft 
C) trespass
D) security
Question
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

A) Drones
B) Helpers 
C) Zombies
D) Servants
Question
When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting __________.

A) industrial espionage 
B) competitive intelligence 
C) opposition research 
D) hostile investigation
Question
"4-1-9" fraud is an example of a ____________________ attack.

A) social engineering
B) virus 
C) worm
D) spam
Question
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.

A) hacktivist
B) phreak 
C) hackcyber
D) cyberhack
Question
The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

A) WWW
B) TCP 
C) FTP
D) HTTP
Question
The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.

A) database 
B) data 
C) information 
D) residual
Question
A short-term interruption in electrical power availability is known as a ____.

A) ​fault
B) ​brownout 
C) ​blackout
D) ​lag
Question
Which of the following is an example of a Trojan horse program  

A) Netsky
B) MyDoom 
C) Klez
D) Happy99.exe
Question
The ____________________ data file contains the hashed representation of the user's password.

A) SLA
B) SNMP 
C) FBI
D) SAM
Question
​A long-term interruption (outage) in electrical power availability is known as a(n) ___________.

A) ​blackout 
B) ​sag 
C) ​brownout 
D) ​fault
Question
The ____________________ fraud is a social engineering attack that involves convincing the victim to participate in a seeming money-making venture while getting the victim to pay fees or bribes or to refund uncleared international payments.
Question
Script ____________________ are hackers of limited skill who use expertly written software to attack a system.
Question
Some information gathering techniques are quite legal-for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.
Question
A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
Question
ESD is the acronym for ____________________ discharge.
Question
In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
Question
Duplication of software-based intellectual property is more commonly known as software ____________________.
Question
A momentary low voltage is called a(n) ____________________.
Question
The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as __________.

A) pharming 
B) phishing 
C) sniffing 
D) pharming
Question
A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.

A) rainbow table  
B) dictionary 
C) crib 
D) crack file
Question
​A short-term decrease in electrical power availability is known as a(n) ___________.

A) ​blackout 
B) ​sag 
C) ​brownout 
D) ​fault
Question
The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.

A) mean time between failure (MTBF)  
B) mean time to diagnose (MTTD) 
C) mean time to failure (MTTF) 
D) mean time to repair (MTTR)
Question
A(n) ____________________ is a potential risk to an information asset.
Question
Attempting to reverse-calculate a password is called ____________________.
Question
The expert hacker sometimes is called a(n) ____________________ hacker.
Question
When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.
Question
A(n) ____________________ is an act against an asset that could result in a loss.
Question
The average amount of time until the next hardware failure is known as __________.

A) ​​mean time between failure (MTBF)  
B) ​mean time to diagnose (MTTD) 
C) ​mean time to failure (MTTF) 
D) ​mean time to repair (MTTR)
Question
A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/91
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: The Need for Security
1
A number of technical mechanisms-digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media-have been used to deter or prevent the theft of software intellectual property.
True
2
With the removal of copyright protection mechanisms, software can be easily distributed and installed.
True
3
The information security function in an organization safeguards its technology assets.
True
4
Forces of nature, sometimes called acts of God, can present some of the most dangerous threats because they usually occur with very little warning and are beyond the control of people.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
5
DoS attacks cannot be launched against routers.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
6
A worm requires that another program is running before it can begin functioning.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
7
Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
8
Much human error or failure can be prevented with effective training and ongoing awareness activities.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
9
Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay discovery. The first act is obviously in the category of  "theft" but the second act is another category-in this case it is a "force of nature." 
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
10
An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
11
When electronic information is stolen, the crime is readily apparent.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
12
Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
13
A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files-such as word-processing documents-and sensitive data transmitted to or from applications.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
14
Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
15
Attacks conducted by scripts are usually unpredictable.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
16
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
17
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
18
As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
19
A mail bomb is a form of DoS attack.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
20
Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
21
Computer assets are the focus of information security and are the information that has value to theorganization, as well as the systems that store, process, and transmit the information. ____________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
22
"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
23
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.

A) SSL
B) SLA 
C) MSL
D) MIN
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
24
Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
25
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
26
Media as a subset of information assets are the systems and networks that store, process, and transmit information.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
28
Hackers are "persons who access systems and information without authorization and often illegally." _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
29
Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following functions does information security perform for an organization  

A) Protecting the organization's ability to function. 
B) Enabling the safe operation of applications implemented on the organization's IT systems. 
C) Protecting the data the organization collects and uses. 
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
31
When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
32
Packet munchkins use automated exploits to engage in distributed denial-of-service attacks. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
33
Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
34
The macro virus infects the key operating system files located in a computer's start-up sector. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
35
Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
36
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
37
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
38
A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
39
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
40
Media are items of fact collected by an organization and include raw numbers, facts, and words.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
41
____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

A) Viruses
B) Worms 
C) Spam
D) Trojan horses
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
42
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

A) denial-of-service
B) distributed denial-of-service 
C) virus
D) spam
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
43
A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

A) denial-of-service
B) distributed denial-of-service 
C) virus
D) spam
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
44
____  is any technology that aids in gathering information about a person or organization without their knowledge.

A) A bot
B) Spyware 
C) A Trojan
D) A worm
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
45
Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.

A) threats
B) education 
C) hugs
D) paperwork
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents.

A) infoterrorism
B) cyberterrorism 
C) hacking
D) cracking
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
47
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ____________________ characters in Internet Explorer 4.0, the browser will crash.

A) 64 
B) 128 
C) 256 
D) 512
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
48
Hackers can be generalized into two skill groups: expert and ____________________.

A) novice
B) journeyman 
C) packet monkey
D) professional
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
49
In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

A) zombie-in-the-middle
B) sniff-in-the-middle 
C) server-in-the-middle
D) man-in-the-middle
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
50
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.

A) false alarms
B) polymorphisms 
C) hoaxes
D) urban legends
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
51
Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

A) bypass
B) theft 
C) trespass
D) security
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
52
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

A) Drones
B) Helpers 
C) Zombies
D) Servants
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
53
When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting __________.

A) industrial espionage 
B) competitive intelligence 
C) opposition research 
D) hostile investigation
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
54
"4-1-9" fraud is an example of a ____________________ attack.

A) social engineering
B) virus 
C) worm
D) spam
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
55
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.

A) hacktivist
B) phreak 
C) hackcyber
D) cyberhack
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
56
The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

A) WWW
B) TCP 
C) FTP
D) HTTP
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
57
The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.

A) database 
B) data 
C) information 
D) residual
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
58
A short-term interruption in electrical power availability is known as a ____.

A) ​fault
B) ​brownout 
C) ​blackout
D) ​lag
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is an example of a Trojan horse program  

A) Netsky
B) MyDoom 
C) Klez
D) Happy99.exe
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
60
The ____________________ data file contains the hashed representation of the user's password.

A) SLA
B) SNMP 
C) FBI
D) SAM
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
61
​A long-term interruption (outage) in electrical power availability is known as a(n) ___________.

A) ​blackout 
B) ​sag 
C) ​brownout 
D) ​fault
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
62
The ____________________ fraud is a social engineering attack that involves convincing the victim to participate in a seeming money-making venture while getting the victim to pay fees or bribes or to refund uncleared international payments.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
63
Script ____________________ are hackers of limited skill who use expertly written software to attack a system.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
64
Some information gathering techniques are quite legal-for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
66
ESD is the acronym for ____________________ discharge.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
67
In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
68
Duplication of software-based intellectual property is more commonly known as software ____________________.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
69
A momentary low voltage is called a(n) ____________________.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
70
The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as __________.

A) pharming 
B) phishing 
C) sniffing 
D) pharming
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
71
A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.

A) rainbow table  
B) dictionary 
C) crib 
D) crack file
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
72
​A short-term decrease in electrical power availability is known as a(n) ___________.

A) ​blackout 
B) ​sag 
C) ​brownout 
D) ​fault
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
73
The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.

A) mean time between failure (MTBF)  
B) mean time to diagnose (MTTD) 
C) mean time to failure (MTTF) 
D) mean time to repair (MTTR)
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) ____________________ is a potential risk to an information asset.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
75
Attempting to reverse-calculate a password is called ____________________.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
76
The expert hacker sometimes is called a(n) ____________________ hacker.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
77
When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) ____________________ is an act against an asset that could result in a loss.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
79
The average amount of time until the next hardware failure is known as __________.

A) ​​mean time between failure (MTBF)  
B) ​mean time to diagnose (MTTD) 
C) ​mean time to failure (MTTF) 
D) ​mean time to repair (MTTR)
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 91 flashcards in this deck.