CIS4361 Chapter 2 Exam With 100%
Correct Answers
Compared to Web site defacement, vandalism within a network is less malicious in
intent and more public. - ANSWER False
A mail bomb is a form of DoS. - ANSWER True
Intellectual property is defined as "the ownership of ideas and control over the tangible
or virtual representation of those ideas." - ANSWER True
Information security's primary mission is to ensure that systems and their contents
retain their confidentiality at all costs. - ANSWER False
Once a(n) back door has infected a computer, it can redistribute itself to all e-mail
addresses found on the infected system. - ANSWER False
Cyberterrorists hack systems to conduct terrorist activities via network or Internet
pathways. - ANSWER True
A firewall is a mechanism that keeps certain kinds of network traffic out of a private
network. - ANSWER True
Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers.
- ANSWER True
A(n) polymorphic threat is one that over time changes the way it appears to antivirus
software programs, making it undetectable by techniques that look for preconfigured
signatures. - ANSWER True
Hackers are "people who use and create computer software to gain access to
information illegally." - ANSWER True
DoS attacks cannot be launched against routers. - ANSWER False
The term phreaker is now commonly associated with an individual who cracks or
removes software protection that is designed to prevent unauthorized duplication. -
ANSWER False
Two watchdog organizations that investigate allegations of software abuse: SIIA and
NSA. - ANSWER False
A worm can deposit copies of itself onto all Web servers that the infected system can
reach, so that users who subsequently visit those sites become infected. - ANSWER
True
, Organizations can use dictionaries to disallow passwords during the reset process and
thus guard against easy-to-guess passwords. - ANSWER True
Packet kiddies use automated exploits to engage in distributed denial-of-service
attacks. - ANSWER False
With electronic information is stolen, the crime is readily apparent. - ANSWER False
When voltage levels surge (experience a momentary increase), the extra voltage can
severely damage or destroy equipment. - ANSWER False
The application of computing and network resources to try every possible combination
of options of a password is called a brute crack attack. - ANSWER False
An act of theft performed by a hacker falls into the category of "theft," but is also often
accompanied by defacement actions to delay discovery and thus may also be placed
within the category of "forces of nature." - ANSWER False
A worm requires that another program is running before it can begin functioning. -
ANSWER False
With the removal of copyright protection, software can be easily distributed and
installed. - ANSWER True
Information security safeguards the technology assets in use at the organization. -
ANSWER True
Forces of nature, force majeure, or acts of God can present some of the most
dangerous threats, because they are usually occur with very little warning and are
beyond the control of people. - ANSWER True
A sniffer program shows all the data going by on a network segment including
passwords, the data inside files—such as word-processing documents—and screens
full of sensitive data from applications. - ANSWER True
A number of technical mechanisms—digital watermarks and embedded code, copyright
codes, and even the intentional placement of bad sectors on software media—have
been used to enforce copyright laws. - ANSWER True
The malicious code attack includes the execution of viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal information. - ANSWER True
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker
routes large quantities of e-mail to the target. - ANSWER False
The macro virus infects the key operating system files located in a computer's boot
sector. - ANSWER False
Expert hackers are extremely talented individuals who usually devote lots of time and
energy to attempting to break into other people's information systems. - ANSWER True
Correct Answers
Compared to Web site defacement, vandalism within a network is less malicious in
intent and more public. - ANSWER False
A mail bomb is a form of DoS. - ANSWER True
Intellectual property is defined as "the ownership of ideas and control over the tangible
or virtual representation of those ideas." - ANSWER True
Information security's primary mission is to ensure that systems and their contents
retain their confidentiality at all costs. - ANSWER False
Once a(n) back door has infected a computer, it can redistribute itself to all e-mail
addresses found on the infected system. - ANSWER False
Cyberterrorists hack systems to conduct terrorist activities via network or Internet
pathways. - ANSWER True
A firewall is a mechanism that keeps certain kinds of network traffic out of a private
network. - ANSWER True
Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers.
- ANSWER True
A(n) polymorphic threat is one that over time changes the way it appears to antivirus
software programs, making it undetectable by techniques that look for preconfigured
signatures. - ANSWER True
Hackers are "people who use and create computer software to gain access to
information illegally." - ANSWER True
DoS attacks cannot be launched against routers. - ANSWER False
The term phreaker is now commonly associated with an individual who cracks or
removes software protection that is designed to prevent unauthorized duplication. -
ANSWER False
Two watchdog organizations that investigate allegations of software abuse: SIIA and
NSA. - ANSWER False
A worm can deposit copies of itself onto all Web servers that the infected system can
reach, so that users who subsequently visit those sites become infected. - ANSWER
True
, Organizations can use dictionaries to disallow passwords during the reset process and
thus guard against easy-to-guess passwords. - ANSWER True
Packet kiddies use automated exploits to engage in distributed denial-of-service
attacks. - ANSWER False
With electronic information is stolen, the crime is readily apparent. - ANSWER False
When voltage levels surge (experience a momentary increase), the extra voltage can
severely damage or destroy equipment. - ANSWER False
The application of computing and network resources to try every possible combination
of options of a password is called a brute crack attack. - ANSWER False
An act of theft performed by a hacker falls into the category of "theft," but is also often
accompanied by defacement actions to delay discovery and thus may also be placed
within the category of "forces of nature." - ANSWER False
A worm requires that another program is running before it can begin functioning. -
ANSWER False
With the removal of copyright protection, software can be easily distributed and
installed. - ANSWER True
Information security safeguards the technology assets in use at the organization. -
ANSWER True
Forces of nature, force majeure, or acts of God can present some of the most
dangerous threats, because they are usually occur with very little warning and are
beyond the control of people. - ANSWER True
A sniffer program shows all the data going by on a network segment including
passwords, the data inside files—such as word-processing documents—and screens
full of sensitive data from applications. - ANSWER True
A number of technical mechanisms—digital watermarks and embedded code, copyright
codes, and even the intentional placement of bad sectors on software media—have
been used to enforce copyright laws. - ANSWER True
The malicious code attack includes the execution of viruses, worms, Trojan horses, and
active Web scripts with the intent to destroy or steal information. - ANSWER True
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker
routes large quantities of e-mail to the target. - ANSWER False
The macro virus infects the key operating system files located in a computer's boot
sector. - ANSWER False
Expert hackers are extremely talented individuals who usually devote lots of time and
energy to attempting to break into other people's information systems. - ANSWER True