and Correct Answers 2025
Compared ,to ,Web ,site ,defacement, ,vandalism ,within ,a ,network ,is ,less ,malicious ,in
,intent ,and ,more ,public. ,- ,CORRECT ,ANSWER-False
A ,mail ,bomb ,is ,a ,form ,of ,DoS. ,- ,CORRECT ,ANSWER-True
Intellectual ,property ,is ,defined ,as ,"the ,ownership ,of ,ideas ,and ,control ,over ,the
,tangible ,or ,virtual ,representation ,of ,those ,ideas." ,- ,CORRECT ,ANSWER-True
Information ,security's ,primary ,mission ,is ,to ,ensure ,that ,systems ,and ,their ,contents
,retain ,their ,confidentiality ,at ,all ,costs. ,- ,CORRECT ,ANSWER-False
Once ,a(n) ,back ,door ,has ,infected ,a ,computer, ,it ,can ,redistribute ,itself ,to ,all ,e-mail
,addresses ,found ,on ,the ,infected ,system. ,- ,CORRECT ,ANSWER-False
Cyberterrorists ,hack ,systems ,to ,conduct ,terrorist ,activities ,via ,network ,or ,Internet
,pathways. ,- ,CORRECT ,ANSWER-True
A ,firewall ,is ,a ,mechanism ,that ,keeps ,certain ,kinds ,of ,network ,traffic ,out ,of ,a ,private
,network. ,- ,CORRECT ,ANSWER-True
Sniffers ,often ,work ,on ,TCP/IP ,networks, ,where ,they're ,sometimes ,called ,packet
,sniffers. ,- ,CORRECT ,ANSWER-True
, A(n) ,polymorphic ,threat ,is ,one ,that ,over ,time ,changes ,the ,way ,it ,appears ,to ,antivirus
,software ,programs, ,making ,it ,undetectable ,by ,techniques ,that ,look ,for ,preconfigured
,signatures. ,- ,CORRECT ,ANSWER-True
Hackers ,are ,"people ,who ,use ,and ,create ,computer ,software ,to ,gain ,access ,to
,information ,illegally." ,- ,CORRECT ,ANSWER-True
DoS ,attacks ,cannot ,be ,launched ,against ,routers. ,- ,CORRECT ,ANSWER-False
The ,term ,phreaker ,is ,now ,commonly ,associated ,with ,an ,individual ,who ,cracks ,or
,removes ,software ,protection ,that ,is ,designed ,to ,prevent ,unauthorized ,duplication. ,-
,CORRECT ,ANSWER-False
Two ,watchdog ,organizations ,that ,investigate ,allegations ,of ,software ,abuse: ,SIIA ,and
,NSA. ,- ,CORRECT ,ANSWER-False
A ,worm ,can ,deposit ,copies ,of ,itself ,onto ,all ,Web ,servers ,that ,the ,infected ,system ,can
,reach, ,so ,that ,users ,who ,subsequently ,visit ,those ,sites ,become ,infected. ,-
,CORRECT ,ANSWER-True
Organizations ,can ,use ,dictionaries ,to ,disallow ,passwords ,during ,the ,reset ,process
,and ,thus ,guard ,against ,easy-to-guess ,passwords. ,- ,CORRECT ,ANSWER-True
Packet ,kiddies ,use ,automated ,exploits ,to ,engage ,in ,distributed ,denial-of-service
,attacks. ,- ,CORRECT ,ANSWER-False
With ,electronic ,information ,is ,stolen, ,the ,crime ,is ,readily ,apparent. ,- ,CORRECT
,ANSWER-False
When ,voltage ,levels ,surge ,(experience ,a ,momentary ,increase), ,the ,extra ,voltage ,can
,severely ,damage ,or ,destroy ,equipment. ,- ,CORRECT ,ANSWER-False
The ,application ,of ,computing ,and ,network ,resources ,to ,try ,every ,possible
,combination ,of ,options ,of ,a ,password ,is ,called ,a ,brute ,crack ,attack. ,- ,CORRECT
,ANSWER-False
An ,act ,of ,theft ,performed ,by ,a ,hacker ,falls ,into ,the ,category ,of ,"theft," ,but ,is ,also
,often ,accompanied ,by ,defacement ,actions ,to ,delay ,discovery ,and ,thus ,may ,also ,be
,placed ,within ,the ,category ,of ,"forces ,of ,nature." ,- ,CORRECT ,ANSWER-False
A ,worm ,requires ,that ,another ,program ,is ,running ,before ,it ,can ,begin ,functioning. ,-
,CORRECT ,ANSWER-False
With ,the ,removal ,of ,copyright ,protection, ,software ,can ,be ,easily ,distributed ,and
,installed. ,- ,CORRECT ,ANSWER-True