CSE360 Arizona State University -IS 360 - Ch.1 verified/passed
CSE360 Arizona State University -IS 360 - Ch.1 verified/passedSoftware that lays dormant until some specific condition is met is a Trojan horse. - correct answer False The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans. - correct answer False The type of hacking that involves breaking into telephone systems is called sneaking. - correct answer False Confidentiality, integrity, and availability are three pillars of the CIA triangle. - correct answer True Auditing is the process to determine if a user's credentials are authorized to access a network resource. - correct answer False A black hat hacker is also called a - correct answer Crackers Someone who legally breaks into a system to assess security deficiencies is called a - correct answer Penetration tester The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand. - correct answer True The technique for breaching a system's security by exploiting human nature rather than technology is war-driving. - correct answer False Someone who finds a flaw in a system and reports that flaw to the vendor of the system is a - correct answer White-hat hacker
Written for
- Institution
-
Arizona State University
- Course
-
CSE360
Document information
- Uploaded on
- May 10, 2024
- Number of pages
- 2
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- is 360 ch1
-
cse360 arizona state university
Also available in package deal