PDF Download
FREE AND STUDY GAMES ABOUT LESSON2-CHAPTER2
EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -20 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive...
Answer:
intelligence
Question 2: the expert hacker sometimes is called...hacker
Answer:
elite Question 3: ...is a technique used to gain unauthorized access to computers, where in the intruder sends messages to a computer that has an IP address that indicates that the messages are coming from a trusted host and not the actual source computer.
Answer:
spoofing
Question 4: A momentary low voltage is called a...
Answer:
sag Question 5: Duplication of software-based intellectual property is more commonly known as software...
Answer:
piracy Question 6: A virus or worm can have a payload that installs a ... door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
Answer:
back Question 7: When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial...
Answer:
espionage Question 8: A computer virus consists of segments of code that perform...actions
Answer:
malicious Question 9: A...is an application error that occurs when more data is sent to a program buffer than it is designed to handle
Answer:
buffer overrun
Question 10: ...is unsolicited commercial e-mail
Answer:
Spam Question 11: A...hacks the public telephone network to make free calls or disrupt services.
Answer:
phreaker
Question 12: A...is an object, person, or other entity that represents a constant danger to an asset.
Answer:
thread Question 13: An...is an act or action that takes advantage of a vulnerability to compromise a controlled system.
Answer:
attack
Question 14: Attempting to reserve-calculate a password is called...
Answer:
cracking Question 15: A...is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication.
Answer:
worm Question 16: Script ... are hackers of limited skill who use expertly written software to attack a system
Answer:
kiddies Question 17: A...is an identified weakness in a controlled system, where controls are not present or are no longer effective
Answer:
vulnerability Question 18: Within the context of information security, ... is the process of using interpersonal skills to convince people to reveal access credentials or other valuable information to the attacker.
Answer:
social engineering
Question 19: ESD means electrostatic...
Answer:
discharge Question 20: The timing attack works by exploring the contents of a Web browser's...
Answer:
cache