Chapter 02

Chapter 02 - 02 True/False Indicate whether the statement...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
02 True/False Indicate whether the statement is true or false. ____ 1. Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs. ____ 2. Information security safeguards the technology assets in use at the organization. ____ 3. Much human error or failure can be prevented with training and ongoing awareness activities. ____ 4. Attacks conducted by scripts are usually unpredictable. ____ 5. Compared to Web site defacement, vandalism from within a network is less malicious in intent and more pub- lic. ____ 6. With the theft of electronic information, the evidence of a crime is readily apparent. ____ 7. A worm requires that another program is running before it can begin functioning. ____ 8. A worm can deposit copies of itself onto all Web servers that the infected system can write to, so that users who subsequently visit those sites become infected. ____ 9. An overflowing of water into a data center can cause direct damage to all or part of the information system. ____ 10. Organizations can use dictionaries to screen passwords during the reset process and thus guard against easy- to-guess passwords. ____ 11. Denial-of-service attacks can not be launched against routers. ____ 12. A mail bomb is a form of DoS. ____ 13. A sniffer program shows all the data on an unswitched network segment by including unencrypted passwords and the data inside files. ____ 14. A timing attack involves interception and analysis of cryptographic elements to determine keys and encryp- tion algorithms. ____ 15. A firewall is a device that keeps certain kinds of network traffic out of a private network. ____ 16. An act of theft performed by a hacker falls into the category of deliberate acts of theft, but is also often ac- companied by defacement actions to delay discovery and thus may also be placed within the category of forces of nature. ____ 17. Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. ____ 18. Enforcement of copyright laws has been attempted through a number of technical security mechanisms, such as the using of digital watermarks and embedded code, the requiring of copyright codes, and even the inten- tional adding of bad sectors on software media. ____ 19. Expert hackers are extremely talented individuals who usually have lots of time and energy to devote to at- tempting to break into other people’s information systems. ____ 20. With the removal of copyright protection, software can be easily distributed and installed. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
statement true. ____ 21.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2011 for the course COM 308 taught by Professor E.bautista during the Fall '10 term at St. Leo.

Page1 / 9

Chapter 02 - 02 True/False Indicate whether the statement...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online