Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Fundamentals
Quiz 1: Introduction to Computer Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Someone who finds a flaw in a system and reports that flaw to the vendor of the system is a __________.
Question 2
True/False
Confidentiality,integrity,and availability are three pillars of the CIA triangle.
Question 3
Multiple Choice
A black hat hacker is also called a ___________
Question 4
True/False
The technique for breaching a system's security by exploiting human nature rather than technology is war-driving.
Question 5
True/False
Software that lays dormant until some specific condition is met is a Trojan horse.
Question 6
Multiple Choice
Someone who gains access to a system and causes harm is a __________?
Question 7
True/False
The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand.
Question 8
True/False
The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems,conduct computer security training,and develop computer security plans.
Question 9
Multiple Choice
In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?
Question 10
Multiple Choice
Someone who calls himself a hacker but lacks the expertise is a ________.
Question 11
Multiple Choice
Your company is instituting a new security awareness program.You are responsible for educating end users on a variety of threats,including social engineering.Which of the following best defines social engineering?