Filters
Question type

Study Flashcards

What type of theft involves stealing another person's personal information,such as a Social Security number,and then using the information to impersonate the victim,generally for financial gain?


A) cyberterrorism
B) identity theft
C) phishing
D) social scam

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?


A) cybercriminal
B) hacker
C) script kiddies
D) cyberterrorist

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Select the term that best describes automated attack software?


A) open-source utility
B) insider software
C) open-source intelligence
D) intrusion application

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?


A) Inside Attacks
B) Advanced Persistent Threat
C) Embedded Attacks
D) Modified Threat

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Describe the security principle of simplicity.

Correct Answer

verifed

verified

Because attacks can come from a variety ...

View Answer

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?


A) unicorn
B) approved action
C) secure solution
D) silver bullet

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?


A) centered
B) local
C) remote
D) distributed

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.

A) True
B) False

Correct Answer

verifed

verified

What type of diversity is being implemented if a company is using multiple security products from different manufacturers?


A) multiple-product security
B) manufacturer diversity
C) vendor diversity
D) vendor-control security

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

In information security,which of the following is an example of a threat actor?


A) a force of nature such as a tornado that could destroy computer equipment
B) a virus that attacks a computer network
C) a person attempting to break into a secure computer network
D) all of the above

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer