Answers 2025 | 2026
Which term below is frequently used to describe the tasks of
securing information that is in a digital format? - ANSWER
information security
What language below is used to view and manipulate data that
is stored in a relational database? - ANSWER SQL
What type of attack is targeted against a smaller group of
specific individuals, such as the major executives working for a
manufacturing company? - ANSWER Watering Hole
What type of theft involves stealing another person's personal
information, such as a Social Security number, and then using
the information to impersonate the victim, generally for
financial gain? - ANSWER Identity theft
A Hardware Security Module (HSM) is essentially a chip on the
motherboard of the computer that provides cryptographic
services. - ANSWER False
,XSS attacks occur when an attacker takes advantage of web
applications that accept user input without validating it and
then present it back to the user. - ANSWER True
An independently rotating large cup affixed to the top of a fence
prevents the hands of intruders from gripping the top of a fence
to climb over it. What is the name for this technology? -
ANSWER roller barrier
In information security, an example of a threat agent can be
____. - ANSWER - a force of nature such as a tornado that could
destroy computer equipment
- a virus that attacks a computer network
- A person attempting to break into a secure computer network
Script kiddies acquire which item below from other attackers to
easily craft an attack: - ANSWER Exploit kit
What type of device, sometimes called a packet filter, is
designed to prevent malicious network packets from entering
or leaving computers or networks? - ANSWER firewall
, Of the three types of mutating malware, what type changes its
internal code to one of a set number of predefined mutations
whenever it is executed? - ANSWER Oligomorphic malware
What is the name of the open source asymmetric cryptography
system that runs on Windows, UNIX, and Linux systems, and is
compatible with PGP? - ANSWER GPG
In what kind of attack can attackers make use of hundreds of
thousands of computers under their control in an attack against
a single server or network? - ANSWER distributed
Anti-virus products typically utilize what type of virus scanning
analysis? - ANSWER Static analysis
The physical procedure whereby an unauthorized person gains
access to a location by following an authorized user is known
as? - ANSWER Tailgating