100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS4361 Chapter 2 Exam With 100% Correct Answers

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
07-04-2025
Written in
2024/2025

CIS4361 Chapter 2 Exam With 100% Correct Answers ...

Institution
CIS4361
Course
CIS4361









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIS4361
Course
CIS4361

Document information

Uploaded on
April 7, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIS4361 Chapter 2 Exam With 100%
Correct Answers

Compared to Web site defacement, vandalism within a network is less malicious in
intent and more public. - ANSWER False

A mail bomb is a form of DoS. - ANSWER True

Intellectual property is defined as "the ownership of ideas and control over the tangible
or virtual representation of those ideas." - ANSWER True

Information security's primary mission is to ensure that systems and their contents
retain their confidentiality at all costs. - ANSWER False

Once a(n) back door has infected a computer, it can redistribute itself to all e-mail
addresses found on the infected system. - ANSWER False

Cyberterrorists hack systems to conduct terrorist activities via network or Internet
pathways. - ANSWER True

A firewall is a mechanism that keeps certain kinds of network traffic out of a private
network. - ANSWER True

Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers.
- ANSWER True

A(n) polymorphic threat is one that over time changes the way it appears to antivirus
software programs, making it undetectable by techniques that look for preconfigured
signatures. - ANSWER True

Hackers are "people who use and create computer software to gain access to
information illegally." - ANSWER True

DoS attacks cannot be launched against routers. - ANSWER False

The term phreaker is now commonly associated with an individual who cracks or
removes software protection that is designed to prevent unauthorized duplication. -
ANSWER False

Two watchdog organizations that investigate allegations of software abuse: SIIA and
NSA. - ANSWER False

A worm can deposit copies of itself onto all Web servers that the infected system can
reach, so that users who subsequently visit those sites become infected. - ANSWER
True

, Organizations can use dictionaries to disallow passwords during the reset process and
thus guard against easy-to-guess passwords. - ANSWER True

Packet kiddies use automated exploits to engage in distributed denial-of-service
attacks. - ANSWER False

With electronic information is stolen, the crime is readily apparent. - ANSWER False

When voltage levels surge (experience a momentary increase), the extra voltage can
severely damage or destroy equipment. - ANSWER False

The application of computing and network resources to try every possible combination
of options of a password is called a brute crack attack. - ANSWER False

An act of theft performed by a hacker falls into the category of "theft," but is also often
accompanied by defacement actions to delay discovery and thus may also be placed
within the category of "forces of nature." - ANSWER False

A worm requires that another program is running before it can begin functioning. -
ANSWER False

With the removal of copyright protection, software can be easily distributed and
installed. - ANSWER True

Information security safeguards the technology assets in use at the organization. -
ANSWER True

Forces of nature, force majeure, or acts of God can present some of the most
dangerous threats, because they are usually occur with very little warning and are
beyond the control of people. - ANSWER True

A sniffer program shows all the data going by on a network segment including
passwords, the data inside files—such as word-processing documents—and screens
full of sensitive data from applications. - ANSWER True

A number of technical mechanisms—digital watermarks and embedded code, copyright
codes, and even the intentional placement of bad sectors on software media—have
been used to enforce copyright laws. - ANSWER True

The malicious code attack includes the execution of viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal information. - ANSWER True

One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker
routes large quantities of e-mail to the target. - ANSWER False

The macro virus infects the key operating system files located in a computer's boot
sector. - ANSWER False

Expert hackers are extremely talented individuals who usually devote lots of time and
energy to attempting to break into other people's information systems. - ANSWER True

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Evergreenview Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
9
Member since
1 year
Number of followers
1
Documents
2319
Last sold
2 months ago

4.8

5 reviews

5
4
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions