Module 2 quiz Flashcards
1
Q
With the removal of copyright protection mechanisms, software can be easily and illegally distributed and installed.
A
True
2
Q
- Compared to Website defacement, vandalism within a network is less malicious in intent and more public.
A
False
3
Q
- A worm requires another program is running before it can begin functioning.
A
False
4
Q
- Forces of nature, sometimes called Acts of God, can present some of the most dangerous threats because they usually occur with very little warning and are beyond the control of people.
A
True
5
Q
- When electronic information is stolen, the crime is readily apparent.
A
False
6
Q
- Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.
A
True
7
Q
- As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown.
A
True
8
Q
- An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms.
A
False
9
Q
- A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files—such as word-processing documents—and sensitive data transmitted to or from applications.
A
True
10
Q
- Media as a subset of information assets are the systems and networks that store, process, and transmit information.
A
True
11
Q
- Attacks conducted by scripts are usually unpredictable.
A
False
12
Q
- The information security function in an organization safeguards its technology assets.
A
False
13
Q
- An e-mail bomb is a form of DoS attack
A
True
14
Q
- When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting______.
A
Industrial Espionage
15
Q
- Human errors or failure often can be prevented with training, ongoing awareness activities, and _____.
A
Controls
16
Q
- Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) _______.
A
SLA