Question
click below
click below
Question
Normal Size Small Size show me how
Lesson2-Chapter2
Principles of information security
Question | Answer |
---|---|
...is unsolicited commercial e-mail | Spam |
A...is an identified weakness in a controlled system, where controls are not present or are no longer effective | vulnerability |
A...hacks the public telephone network to make free calls or disrupt services. | phreaker |
Within the context of information security, ... is the process of using interpersonal skills to convince people to reveal access credentials or other valuable information to the attacker. | social engineering |
ESD means electrostatic... | discharge |
Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive... | intelligence |
the expert hacker sometimes is called...hacker | elite |
An...is an act or action that takes advantage of a vulnerability to compromise a controlled system. | attack |
A...is an object, person, or other entity that represents a constant danger to an asset. | thread |
Duplication of software-based intellectual property is more commonly known as software... | piracy |
The timing attack works by exploring the contents of a Web browser's... | cache |
A momentary low voltage is called a... | sag |
When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial... | espionage |
A...is an application error that occurs when more data is sent to a program buffer than it is designed to handle | buffer overrun |
A...is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication. | worm |
Attempting to reserve-calculate a password is called... | cracking |
A computer virus consists of segments of code that perform...actions | malicious |
A virus or worm can have a payload that installs a ... door or trap door component in a system, which allows the attacker to access the system at will with special privileges. | back |
Script ... are hackers of limited skill who use expertly written software to attack a system | kiddies |
...is a technique used to gain unauthorized access to computers, where in the intruder sends messages to a computer that has an IP address that indicates that the messages are coming from a trusted host and not the actual source computer. | spoofing |