Filters
Question type

Study Flashcards

Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

Social engineering is using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.

Correct Answer

verifed

verified

Which of the following is not one of the three primary information security areas?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of these

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Information security ______________ identify the rules required to maintain information security.

Correct Answer

verifed

verified

What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?


A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of these

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) White-hat hackers
B) Black-hat hackers
C) Crackers
D) Cyberterrorists

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Content filtering,_________,and firewalls are the three types of prevention and resistance technologies.

Correct Answer

verifed

verified

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?


A) Biometrics
B) Encryption
C) Firewalls
D) None of these

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is a program or device that can monitor data traveling over a network?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which is a virus that opens a way into the network for future attacks?


A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is the most common type of defense within detection and response technologies?


A) Malicious code
B) Token
C) User ID
D) Antivirus software

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

Correct Answer

verifed

verified

Which of the following is not considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) None of these

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?


A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

What are the technologies available to help prevent and build resistance to attacks?


A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 61 - 76 of 76

Related Exams

Show Answer