Solutions
Save
Practice questions for this set
Learn 1 /7 Study with Learn
service pack
Choose an answer
Which term below is frequently used to describe the tasks of securing information that is in
1
a digital format?
In what kind of attack can attackers make use of hundreds of thousands of computers
2
under their control in an attack against a single server or network?
A Hardware Security Module (HSM) is essentially a chip on the motherboard of the
3
computer that provides cryptographic services.
What is the name for a cumulative package of all patches and hotfixes as well as additional
4
features up to a given point?
Don't know?
Terms in this set (80)
, Which term below is information security
frequently used to describe
the tasks of securing
information that is in a
digital format?
What language below is SQL
used to view and
manipulate data that is
stored in a relational
database?
What type of attack is Watering Hole
targeted against a smaller
group of specific
individuals, such as the
major executives working
for a manufacturing
company?
What type of theft involves Identity theft
stealing another person's
personal information, such
as a Social Security
number, and then using the
information to impersonate
the victim, generally for
financial gain?
A Hardware Security False
Module (HSM) is essentially
a chip on the motherboard
of the computer that
provides cryptographic
services.
XSS attacks occur when an True
attacker takes advantage of
web applications that
accept user input without
validating it and then
present it back to the user.