Professional Documents
Culture Documents
TRUE/FALSE
1. Information security’s primary mission is to ensure that systems and their contents retain their
confidentiality at all costs.
3. A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.
4. An act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied
by defacement actions to delay discovery and thus may also be placed within the category of “forces of
nature.”
5. Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.
6. A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and
even the intentional placement of bad sectors on software media—have been used to enforce copyright
laws.
7. A worm requires that another program is running before it can begin functioning.
8. A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that
users who subsequently visit those sites become infected.
10. Expert hackers are extremely talented individuals who usually devote lots of time and energy to
attempting to break into other people’s information systems.
11. With the removal of copyright protection, software can be easily distributed and installed.
12. Forces of nature, force majeure, or acts of God can present some of the most dangerous threats,
because they are usually occur with very little warning and are beyond the control of people.
13. Much human error or failure can be prevented with training and ongoing awareness activities.
14. Compared to Web site defacement, vandalism within a network is less malicious in intent and more
public.
16. Organizations can use dictionaries to disallow passwords during the reset process and thus guard
against easy-to-guess passwords.
19. A sniffer program shows all the data going by on a network segment including passwords, the data
inside files—such as word-processing documents—and screens full of sensitive data from
applications.
20. A timing attack involves the interception of cryptographic elements to determine keys and encryption
algorithms.
MODIFIED TRUE/FALSE
1. Intellectual property is defined as “the ownership of ideas and control over the tangible or virtual
representation of those ideas.” _________________________
ANS: F, boot
PTS: 1 REF: 47
3. Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on
the infected system. _________________________
ANS: F
virus
worm
PTS: 1 REF: 48
4. A(n) polymorphic threat is one that over time changes the way it appears to antivirus software
programs, making it undetectable by techniques that look for preconfigured signatures.
_________________________
5. When voltage levels surge (experience a momentary increase), the extra voltage can severely damage
or destroy equipment. _________________________
ANS: F, spike
PTS: 1 REF: 51
6. The shoulder looking technique is used in public or semipublic settings when individuals gather
information they are not authorized to have by looking over another individual’s shoulder or viewing
the information from a distance. _________________________
ANS: F, surfing
PTS: 1 REF: 52
7. Hackers are “people who use and create computer software to gain access to information illegally.”
_________________________
ANS: F, monkeys
PTS: 1 REF: 53
9. The term phreaker is now commonly associated with an individual who cracks or removes software
protection that is designed to prevent unauthorized duplication. _________________________
ANS: F, cracker
Another random document with
no related content on Scribd:
1.E.2. If an individual Project Gutenberg™ electronic work is
derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to anyone
in the United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™
work in a format other than “Plain Vanilla ASCII” or other format
used in the official version posted on the official Project
Gutenberg™ website (www.gutenberg.org), you must, at no
additional cost, fee or expense to the user, provide a copy, a means
of exporting a copy, or a means of obtaining a copy upon request, of
the work in its original “Plain Vanilla ASCII” or other form. Any
alternate format must include the full Project Gutenberg™ License
as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the method
you already use to calculate your applicable taxes. The fee is owed
to the owner of the Project Gutenberg™ trademark, but he has
agreed to donate royalties under this paragraph to the Project
Gutenberg Literary Archive Foundation. Royalty payments must be
paid within 60 days following each date on which you prepare (or
are legally required to prepare) your periodic tax returns. Royalty
payments should be clearly marked as such and sent to the Project
Gutenberg Literary Archive Foundation at the address specified in
Section 4, “Information about donations to the Project Gutenberg
Literary Archive Foundation.”
• You provide a full refund of any money paid by a user who notifies
you in writing (or by e-mail) within 30 days of receipt that s/he does
not agree to the terms of the full Project Gutenberg™ License. You
must require such a user to return or destroy all copies of the works
possessed in a physical medium and discontinue all use of and all
access to other copies of Project Gutenberg™ works.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES
OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.