39. Which of the following functions does information security perform for an organization? a. Protecting the organization's ability to function. b. Enabling the safe operation of applications implenented on the organization's IT systems. c. Protecting the data the organization collects and uses. d. All of the above. 40. The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as security. a. database b. data c. information d. residual 41. Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) a. SSL b. SLA c. MSL d. MIN 42. A short-term interruption in electrical power availability is known as a a. Fisult b. brownout c. blackout d. lag 43. When information gatherers employ techniques that cross a legal or ethical threshold, they are conducting a. industrial espionage b. competitive intelligence c. opposition research d. hostile investigation 44. A long-term interruption (outage) in clectrical power availability is knowit as a(n) a. bleckout b. sag c. brownout d. fault 45. Hackers can be generalized into two skill groups: expert and 3. novice b. journeyman c. packet monkey d. professional
46. Acts of can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. a. bypass b. theft c. trespass d. security 47. The \( \quad \) data file contains the hashed representation of the user's password. a. SLA b. SNMP c. FBI d.SAM 48. A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) a. rainbow table b. dictionary c. crib d. crack file 49. Human error or failure often can be prevented with training, ongoing awareness activities, and a. threats b. controls c. hugs d. paperwork 50. Advance-Fee fraud is an example of a attack, a. social engincering b. virus c. worm d. spam 51. One form of online vandalism is operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or govemment agency. a. hacktivist b. phreak c. hackeyber d. cyberhack 52. is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data that result in violence against noncombatant targets by subnational groups or clandestine agents. a. infoterrorism b. cyberterrorism c. hacking d. eracking 53. is any technology that aids in gathering information about a person or organization without their knowledge a. A bot b. Spyware c. A Trojan d. A worm \( 54 . \) are malware programs that hide their true nature and reveal their designed behavior only when activated. a. Viruses b. Worms c. Spam d. Trojan horses
55. Which of the following is an example of a Trojan horse program? a. Netsky b. MyDoom c. Klez d. Happy99.exe 56. As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus a. false alarms b. polymorphisms c. hoaxes d. urban legends 57. In a attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources. a. denial-of-service b. distributed denial-of-service c. virus d. spam 58. A _ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. a. denial-of-service b. distributed denial-of-service c. virus d. spam 59. are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack. a. Drones b. Helpers c. Zombies d. Servants 60. In the into the network. into the network. a. zombic-in-the-middle b. sniff-in-the-middle c. server-in-the-middle d. man-in-the-middle 61. The hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. a. WWW b. TCP c. FIP d. HTTP 62. The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information is known as a. pharming b. phishing c. sniffing d. spoofing 63. The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as a. mean time between failure (MTBF)
Module 2 The Need for Information Security b. mean time to diagnose (MTTD) c. mean time to failure (MTTF) d. mean time to repair (MTTR) 64. The average amount of time until the next hardware failure is known as a. mean time between failure (MTBF) b. mean time to diagnose (MTTD) c. mean time to failure (MTTF) d. mean time to repair (MTTR) 65. Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than characters in Internet Explorer \( 4.0 \), the browser will crash. a. 64 b. 128 c. 256 d. 512