A _________________________ is when the attacker sends a large number of connection or information requests to a target and the system becomes overloaded and cannot respond to legitimate requests for service.
A. 
Man-in-the-middle attack
B. 
Denial-of-service attack
C. 
Spoofing attack
D. 
Brute force attack
2.
A ___________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.
A. 
Vulnerability
B. 
Dictionary attack
C. 
Hoax
D. 
Password crack
3.
Since a brownout is only a temporary drop in power voltage, no serious damage can come to electrical systems.
A. 
True
B. 
False
4.
Trojan horses are software programs that hide their true purpose, and reveal their designed behavior only when activated.
A. 
True
B. 
False
5.
A phreaker is someone who hacks into the public telephone network to make free calls or disrupt services.
A. 
True
B. 
False
6.
When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting ________________________.
A. 
Industrial espionage
B. 
Competitive intelligence
C. 
Shoulder surfing
7.
A deliberate act of theft would be:
A. 
Equipment failure
B. 
Piracy or copyright infringement
C. 
Illegal confiscation of equipment or information
8.
Information security has more to do with technology than management.
A. 
True
B. 
False
9.
Both general management and information technology management are responsible for implementing information security.
A. 
True
B. 
False
10.
Unlike any other of the information technology programs, the primary mission of an information security program is to ensure that systems and their contents remain the same.
A. 
True
B. 
False
11.
Developers use a process known as change control to ensure that the working system delivered to users represents the intent of the developers.
Do you know about user security awareness? To check your knowledge of user information security awareness, take this quiz. In this awareness program, the employees of an organization are educated about cybercrimes and other...
Questions: 20 | Attempts: 15357 | Last updated: Mar 22, 2022
Sample Question
Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?