code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________ Selected Answer: Tru e
Answers: Tru e False Question 5 1 out of 1 points One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. Selected Answer: c. hacktivist Answers: a. cyberhack b. phreak c. hacktivist d. hackcyber Question 6 0 out of 1 points A mail bomb is a form of DoS attack. Selected Answer: Fals e Answers: Tru e False Question 7 1 out of 1 points Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems. Selected Answer: Tru e Answers: Tru e False Question 8 1 out of 1 points The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. Selected Answer: a. TCP Answers: a. TCP
b. FTP c. WWW d. HTTP Question 9 0 out of 1 points The ____________________ data file contains the hashed representation of the user’s password. Selected Answer: b. SLA Answers: a. FBI b. SLA c. SAM d. SNMP Question 10 1 out of 1 points Hackers can be generalized into two skill groups: expert and ____________________. Selected Answer: c. novice Answers: a. professional b. journeyman c.
You've reached the end of your free preview.
Want to read all 5 pages?
- Spring '14
- Information Security, Denial-of-service attack, Botnet