Filters
Question type

Study Flashcards

Which of the following is the principle of management that develops,creates,and implements strategies for the accomplishment of objectives?


A) leading
B) controlling
C) organizing
D) planning

Correct Answer

verifed

verified

D

In the____________________attack,an attacker monitors (or sniffs) packets from the network,modifies them,and inserts them back into the network.


A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle

Correct Answer

verifed

verified

____________________are malware programs that hide their true nature,and reveal their designed behavior only when activated.


A) Viruses
B) Worms
C) Spam
D) Trojan horses

Correct Answer

verifed

verified

D

One form of e-mail attack that is also a DoS attack is called a mail spoof,in which an attacker overwhelms the receiver with excessive quantities of e-mail._________________________

Correct Answer

verifed

verified

What is authentication?Provide some examples.

Correct Answer

verifed

verified

Authentication is the process by which a...

View Answer

A ____________________is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.


A) denial-of-service
B) distributed denial-of-service
C) virus
D) spam

Correct Answer

verifed

verified

List and explain the four principles of management under the contemporary or popular management theory.Briefly define each.

Correct Answer

verifed

verified

Popular management theory,which categori...

View Answer

Communications security involves the protection of which of the following?.


A) radio handsets
B) people, physical assets
C) the IT department
D) media, technology, and content

Correct Answer

verifed

verified

A momentary low voltage is called a(n)____________________.

Correct Answer

verifed

verified

ESD is the acronym for ____________________ discharge.

Correct Answer

verifed

verified

A ____________ overflow is an application error that occurs when the system can't handle the amount of data that is sent.

Correct Answer

verifed

verified

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance._________________________

Correct Answer

verifed

verified

Corruption of information can occur only while information is being stored.

Correct Answer

verifed

verified

False

The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?


A) accountability
B) authorization
C) identification
D) authentication

Correct Answer

verifed

verified

There are 12 general categories of threat to an organization's people,information,and systems.List at least six of the general categories of threat and identify at least one example of those listed.

Correct Answer

verifed

verified

Compromises to intellectual property
So...

View Answer

DoS attacks cannot be launched against routers.

Correct Answer

verifed

verified

List themeasures that are commonly used to protect the confidentiality of information.

Correct Answer

verifed

verified

Information classification
Se...

View Answer

Discuss the planning element of information security.

Correct Answer

verifed

verified

Planning in InfoSec management is an ext...

View Answer

What do audit logs that track user activity on an information system provide?


A) identification
B) authorization
C) accountability
D) authentication

Correct Answer

verifed

verified

Which type of attack involves sending a large number of connection or information requests to a target?


A) malicious code
B) denial-of-service (DoS)
C) brute force
D) spear fishing

Correct Answer

verifed

verified

Showing 1 - 20 of 63

Related Exams

Show Answer