Filters
Question type

Study Flashcards

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

Correct Answer

verifed

verified

A(n) _________ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.

Correct Answer

verifed

verified

_______________ is a hacker with criminal intent.

Correct Answer

verifed

verified

What is the most common type of defense within detection and response technologies?


A) Malicious code
B) Token
C) User ID
D) Antivirus software

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Describe authentication and the most secure type of authentication.

Correct Answer

verifed

verified

Authentication is a method for confirmin...

View Answer

Tokens are small electronic devices that change user passwords __________.

Correct Answer

verifed

verified

The most common type of defense within detection and response technologies is _________ software.

Correct Answer

verifed

verified

What are the technologies available to help prevent and build resistance to attacks?


A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are people very knowle...

View Answer

Who breaks into other people's computer systems and just looks around or steals and destroys information?


A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

The ____________ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time, overloading it and shutting it down.

Correct Answer

verifed

verified

Smart card is a(n) ___________ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.

Correct Answer

verifed

verified

Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?


A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Correct Answer

verifed

verified

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?


A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

Showing 21 - 40 of 80

Related Exams

Show Answer