• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT LESSON2-CHAPTER2

Study guide Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT LESSON2-CHAPTER2

EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -20 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive...

Answer:

intelligence

Question 2: the expert hacker sometimes is called...hacker

Answer:

elite Question 3: ...is a technique used to gain unauthorized access to computers, where in the intruder sends messages to a computer that has an IP address that indicates that the messages are coming from a trusted host and not the actual source computer.

Answer:

spoofing

Question 4: A momentary low voltage is called a...

Answer:

sag Question 5: Duplication of software-based intellectual property is more commonly known as software...

Answer:

piracy Question 6: A virus or worm can have a payload that installs a ... door or trap door component in a system, which allows the attacker to access the system at will with special privileges.

Answer:

back Question 7: When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial...

Answer:

espionage Question 8: A computer virus consists of segments of code that perform...actions

Answer:

malicious Question 9: A...is an application error that occurs when more data is sent to a program buffer than it is designed to handle

Answer:

buffer overrun

Question 10: ...is unsolicited commercial e-mail

Answer:

Spam Question 11: A...hacks the public telephone network to make free calls or disrupt services.

Answer:

phreaker

Question 12: A...is an object, person, or other entity that represents a constant danger to an asset.

Answer:

thread Question 13: An...is an act or action that takes advantage of a vulnerability to compromise a controlled system.

Answer:

attack

Question 14: Attempting to reserve-calculate a password is called...

Answer:

cracking Question 15: A...is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication.

Answer:

worm Question 16: Script ... are hackers of limited skill who use expertly written software to attack a system

Answer:

kiddies Question 17: A...is an identified weakness in a controlled system, where controls are not present or are no longer effective

Answer:

vulnerability Question 18: Within the context of information security, ... is the process of using interpersonal skills to convince people to reveal access credentials or other valuable information to the attacker.

Answer:

social engineering

Question 19: ESD means electrostatic...

Answer:

discharge Question 20: The timing attack works by exploring the contents of a Web browser's...

Answer:

cache

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Study guide
Description:

PDF Download FREE AND STUDY GAMES ABOUT LESSON2-CHAPTER2 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -20 Questions and Answers -format ...

UNLOCK ACCESS $11.99