verified solutions
Corruption of information can occur only while information is being stored. a. True b. False - correct
answer ✔✔False
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach,
so that users who subsequently visit those sites become infected. a. True b. False - correct answer
✔✔True
DoS attacks cannot be launched against routers. a. True b. False - correct answer ✔✔False
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms
the receiver with excessive quantities of e-mail. a. True b. False - correct answer ✔✔False - bomb
"Shoulder spying" is used in public or semi-public settings when individuals gather information they are
not authorized to have by looking over another individual's shoulder or viewing the information from a
distance. a. True b. False - correct answer ✔✔False - surfing
What do audit logs that track user activity on an information system provide? - correct answer
✔✔accountability
Any event or circumstance that has the potential to adversely affect operations and assets is known as
a(n) - correct answer ✔✔threat
A technique used to compromise a system is known as a(n) - correct answer ✔✔exploit
A hacker who intentionally removes or bypasses software copyright protection designed to prevent
unauthorized duplication or use is known as a(n) - correct answer ✔✔cracker