Home / Expert Answers / Computer Science / 39-which-of-the-following-functions-does-information-security-perform-for-an-organization-a-prot-pa477

(Solved): 39. Which of the following functions does information security perform for an organization? a. Prot ...




39. Which of the following functions does information security perform for an organization?
a. Protecting the organizations
46. Acts of can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems t
55. Which of the following is an example of a Trojan horse program?
a. Netsky
b. MyDoom
c. Klez
d. Happy99.exe
56. As frustra
Module 2 The Need for Information Security
b. mean time to diagnose (MTTD)
c. mean time to failure (MTTF)
d. mean time to rep
39. Which of the following functions does information security perform for an organization? a. Protecting the organization's ability to function. b. Enabling the safe operation of applications implenented on the organization's IT systems. c. Protecting the data the organization collects and uses. d. All of the above. 40. The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as security. a. database b. data c. information d. residual 41. Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) a. SSL b. SLA c. MSL d. MIN 42. A short-term interruption in electrical power availability is known as a a. Fisult b. brownout c. blackout d. lag 43. When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting a. industrial espionage b. competitive intelligence c. opposition research d. hostile investigation 44. A long-term interruption (outage) in clectrical power availability is knowit as a(n) a. bleckout b. sag c. brownout d. fault 45. Hackers can be generalized into two skill groups: expert and 3. novice b. journeyman c. packet monkey d. professional 46. Acts of can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. a. bypass b. theft c. trespass d. security 47. The \( \quad \) data file contains the hashed representation of the user's password. a. SLA b. SNMP c. FBI d.SAM 48. A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) a. rainbow table b. dictionary c. crib d. crack file 49. Human error or failure often can be prevented with training, ongoing awareness activities, and a. threats b. controls c. hugs d. paperwork 50. Advance-Fee fraud is an example of a attack, a. social engincering b. virus c. worm d. spam 51. One form of online vandalism is operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or govemment agency. a. hacktivist b. phreak c. hackeyber d. cyberhack 52. is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents. a. infoterrorism b. cyberterrorism c. hacking d. eracking 53. is any technology that aids in gathering information about a person or organization without their knowledge a. A bot b. Spyware c. A Trojan d. A worm \( 54 . \) are malware programs that hide their true nature and reveal their designed behavior only when activated. a. Viruses b. Worms c. Spam d. Trojan horses 55. Which of the following is an example of a Trojan horse program? a. Netsky b. MyDoom c. Klez d. Happy99.exe 56. As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus a. false alarms b. polymorphisms c. hoaxes d. urban legends 57. In a attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources. a. denial-of-service b. distributed denial-of-service c. virus d. spam 58. A _ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. a. denial-of-service b. distributed denial-of-service c. virus d. spam 59. are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack. a. Drones b. Helpers c. Zombies d. Servants 60. In the into the network. into the network. a. zombic-in-the-middle b. sniff-in-the-middle c. server-in-the-middle d. man-in-the-middle 61. The hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. a. WWW b. TCP c. FIP d. HTTP 62. The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as a. pharming b. phishing c. sniffing d. spoofing 63. The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as a. mean time between failure (MTBF) Module 2 The Need for Information Security b. mean time to diagnose (MTTD) c. mean time to failure (MTTF) d. mean time to repair (MTTR) 64. The average amount of time until the next hardware failure is known as a. mean time between failure (MTBF) b. mean time to diagnose (MTTD) c. mean time to failure (MTTF) d. mean time to repair (MTTR) 65. Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than characters in Internet Explorer \( 4.0 \), the browser will crash. a. 64 b. 128 c. 256 d. 512


We have an Answer from Expert

View Expert Answer

Expert Answer


As per the Chegg guidelines
We have an Answer from Expert

Buy This Answer $5

Place Order

We Provide Services Across The Globe