Questions and CORRECT Answers
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network,
modifies them, and inserts them back into the network. - CORRECT ANSWER - b. man-
in-the-middle
____ is an integrated system of software, encryption methodologies, and legal agreements that
can be used to support the entire information infrastructure of an organization. - CORRECT
ANSWER - b. PKI
Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. ____
dictates what steps are taken when an attack occurs. - CORRECT ANSWER - d. Incident
response
One form of online vandalism is ____ operations, which interfere with or disrupt systems to
protest the operations, policies, or actions of an organization or government agency. -
CORRECT ANSWER - b. hacktivist
The ____ data file contains the hashed representation of the user's password. - CORRECT
ANSWER - b. SAM
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on
the network. - CORRECT ANSWER - d. TCP
What is the subject of the Computer Security Act? - CORRECT ANSWER - a. Federal
Agency Information Security
What is the subject of the Sarbanes-Oxley Act? - CORRECT ANSWER - b. Financial
Reporting