Information Security Session 2 Assessment

11 Questions | Total Attempts: 310

SettingsSettingsSettings
Information Security Session 2 Assessment - Quiz

Information Security Session 2 Assessment


Questions and Answers
  • 1. 
    A _________________________ is when the attacker sends a large number of connection or information requests to a target and the system becomes overloaded and cannot respond to legitimate requests for service.
    • A. 

      Man-in-the-middle attack

    • B. 

      Denial-of-service attack

    • C. 

      Spoofing attack

    • D. 

      Brute force attack

  • 2. 
    A ___________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.
    • A. 

      Vulnerability

    • B. 

      Dictionary attack

    • C. 

      Hoax

    • D. 

      Password crack

  • 3. 
    Since a brownout is only a temporary drop in power voltage, no serious damage can come to electrical systems.
    • A. 

      True

    • B. 

      False

  • 4. 
    Trojan horses are software programs that hide their true purpose, and reveal their designed behavior only when activated.
    • A. 

      True

    • B. 

      False

  • 5. 
    A phreaker is someone who hacks into the public telephone network to make free calls or disrupt services.
    • A. 

      True

    • B. 

      False

  • 6. 
    When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting ________________________.
    • A. 

      Industrial espionage

    • B. 

      Competitive intelligence

    • C. 

      Shoulder surfing

  • 7. 
    A deliberate act of theft would be:
    • A. 

      Equipment failure

    • B. 

      Piracy or copyright infringement

    • C. 

      Illegal confiscation of equipment or information

  • 8. 
    Information security has more to do with technology than management.
    • A. 

      True

    • B. 

      False

  • 9. 
    Both general management and information technology management are responsible for implementing information security.
    • A. 

      True

    • B. 

      False

  • 10. 
    Unlike any other of the information technology programs, the primary mission of an information security program is to ensure that systems and their contents remain the same.
    • A. 

      True

    • B. 

      False

  • 11. 
    Developers use a process known as change control to ensure that the working system delivered to users represents the intent of the developers.
    • A. 

      True

    • B. 

      False

Back to Top Back to top