Ch1 Comp Security

2287 Words Sep 3rd, 2015 10 Pages
Chapter 1: Introduction to Information Security

TRUE/FALSE

1. An indirect attack involves a hacker using a personal computer to break into a system.

ANS: F PTS: 1 REF: 3

2. The value of information comes from the characteristics it possesses.

ANS: T PTS: 1 REF: 6

3. By balancing information security and access, a completely secure information system can be created.

ANS: F PTS: 1 REF: 8

4. The security blueprint is a detailed version of the security framework.

ANS: T PTS: 1 REF: 25

5. One of the basic tenets of security architectures is the spheres of security.

ANS: F PTS: 1 REF: 30

MULTIPLE CHOICE

1. Which term describes a subject or object’s ability to use, manipulate, modify, or affect another
…show more content…
a.|linear|c.|graphical|
b.|triangular|d.|semantic|

ANS: C PTS: 1 REF: 8

9. Which individual interferes with or disrupts systems to protest the operations, policies, or actions of an organization or government agency?
a.|Cyberterrorist|c.|Phreaker|
b.|Packet monkey|d.|Hacktivist|

ANS: D PTS: 1 REF: 11

10. Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service?
a.|Cyberterrorist|c.|Phreaker|
b.|Packet monkey|d.|Hacktivist|

ANS: B PTS: 1 REF: 12

11. Which threat is the most common intellectual property (IP) breach?
a.|Software piracy|c.|Shoulder surfing|
b.|Spoofing|d.|Password cracking|

ANS: A PTS: 1 REF: 12

12. Which attack is used when a copy of the hash of the user’s password has been obtained?
a.|Rainbow attack|c.|Dictionary attack|
b.|Brute force attack|d.|Spoofing|

ANS: A PTS: 1 REF: 13

13. Which e-mail attack occurs when an attacker routes large quantities of e-mail to the target system?
a.|Buffer overflow|c.|Spam|
b.|Mail bomb|d.|Timing attack|

ANS: B PTS: 1 REF: 16

14. A(n) ____ is an application error that occurs when more data is sent to a buffer than it can handle.
a.|timing attack|c.|dictionary attack|
b.|application control list|d.|buffer overflow|

ANS: D PTS: 1 REF:
Open Document