Question - Question: (TCO 1) Information warfare falls into...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Picture 1 Picture 2 Picture 3 Picture 4 Picture 5 Picture 6 Picture 7 Picture 8 Question: (TCO 1) Information warfare falls into the category of ____. Your Answer: a. critical infrastructures INCORRECT b. unstructured threat c. highly structured threat CORRECT ANSWER d. structured threat Instructor Explanation: ANS: C REF: Page 8 Points Received: 0 of 10 Comments: 2. Question: (TCO 1) Which of the following activities can be termed as a hacktivist attack? Your Answer: a. A disgruntled ex-employee deletes data from the server of his former organization. b. An attacker protests against globalization defaces the web site of a multinational corporation. CORRECT ANSWER c. An attacker who desires to obtain credit card or other personal information breaks into a bank’s web site. INCORRECT d. A terrorist group hacks into the computer system of a country’s energy infrastructure. Instructor Explanation: ANS: B Page 10 Points Received: 0 of 10 Comments: 3. Question:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Picture 9 Picture 10 Picture 1 Picture 12 Picture 13 Picture 14 Picture 15 Picture 16 (TCO 3) The method of authentication that uses physical characteristics of a person is known as ____. Your Answer: authorization INCORRECT biometrics CORRECT ANSWER cryptography robotics Instructor Explanation: Ans: B Ref: Page 187 Points Received: 0 of 10 Comments: 4. Question: (TCO 3) What is the weakest link in a security chain? Your Answer: Hardware Software Administrator User CORRECT Instructor Explanation: Ans: D Ref: Page 185 Points Received: 10 of 10 Comments: 5. Question: (TCO 3) The method of authentication that uses physical characteristics of a person is known as ____. Your Answer:
Background image of page 2
Picture 17 Picture 18 Picture 19 Picture 20 Picture 21 Picture 2 Picture 23 Picture 24 a. authorization b. biometrics CORRECT c. cryptography d. robotics Instructor Explanation: ANS: B REF: Page 187 Points Received: 10 of 10
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/24/2011 for the course COMP 100 taught by Professor Dfgdegg during the Spring '08 term at DeVry Chicago O'Hare.

Page1 / 10

Question - Question: (TCO 1) Information warfare falls into...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online