100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Intro to IA Mid Term study guide multiple choice $14.49   Add to cart

Exam (elaborations)

Intro to IA Mid Term study guide multiple choice

 0 view  0 purchase
  • Course
  • Intro to IA
  • Institution
  • Intro To IA

Which of the following is not one of the three major classes of threats? A computer virus or worm Denial of Service attacks Actually intruding on a system Online auction fraud - answer-Online auction fraud Those who exploit systems for harm such as to erase files, change data, or defa...

[Show more]

Preview 4 out of 33  pages

  • September 30, 2024
  • 33
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Intro to IA
  • Intro to IA
avatar-seller
TOPDOCTOR
Intro to IA Mid Term study guide multiple choice

Which of the following is not one of the three major classes of threats?

A computer virus or worm

Denial of Service attacks

Actually intruding on a system

Online auction fraud - answer-Online auction fraud



Those who exploit systems for harm such as to erase files, change data, or deface Web sites are typically
called:

gray hat hackers

red hat hackers

black hat hackers

white hat hackers - answer-black hat hackers



Which of the following is the best definition for non-repudiation?

It is another term for user authentication.

Access control

Processes that verify which user performs what action.

Security that does not allow the potential intruder to deny his attack - answer-Processes that verify
which user performs what action



Which of the following is the most accurate definition of a virus?

Any program that can damage your system

Any program that self replicates

Any program that carries a malicious payload

Any program that spreads via email. - answer-Any program that self replicates

,An intrusion-detection system is an example of:

Hybrid security

Good security practices

Proactive security

Perimeter security - answer-Proactive security



In addition to mandating federal agencies to establish security measures, the Computer Security Act of
1987 defined important terms such as:

private information

security information

sensitive information

unauthorized access - answer-sensitive information



Which of the following is the best definition of malware?

Software that self replicates

Any software that is not properly configured for your system

Software that damages your system

Software that has some malicious purpose - answer-Software that has some malicious purpose



What is the term for hacking a phone system?

phreaking

Telco-hacking

Hacking

Cracking - answer-phreaking



Encryption and virtual private networks are techniques used to secure which of the following?

Data

Firewalls

Proxy servers

,Connection points - answer-Data



What are the three approaches to security?

High security, medium security, and low security

Perimeter, complete, and none

Internal, external, and hybrid

Perimeter, layered, and hybrid - answer-Perimeter, layered, and hybrid



Which of the following is the best definition for war-driving?

Driving while using a wireless connection to hack

Driving while hacking and seeking a computer job

Driving looking for wireless networks to hack

Driving and seeking rival hackers - answer-Driving looking for wireless networks to hack



Are there any reasons not to take an extreme view of security, if that view errs on the side of caution?

Yes, if you are going to err, assume there are few if any realistic threats.

No, there is no reason not to take such an extreme view.

Yes, that can lead to wasting resources on threats that are not likely.

Yes, that can require that you increase your security skills in order to implement more rigorous
defenses. - answer-Yes, that can lead to wasting resources on threats that are not likely.



The process of reviewing logs, records, and procedures to determine whether they meet appropriate
standards is called:

sneaking

filtering

auditing

authenticating - answer-auditing



Which approach to security is proactive in addressing potential threats before they occur?

, Passive security approach

Layered security approach

Hybrid security approach

Dynamic security approach - answer-Dynamic security approach



Blocking attacks seek to accomplish what?

Shut down security measures

Prevent legitimate users from accessing a system

Break into a target system

Install a virus on the target machine - answer-Prevent legitimate users from accessing a system



Which term is generally used by hackers to refer to attempts at intrusion into a system without
permission and usually for malevolent purposes?

Blocking

Social engineering.

Cracking

Hacking - answer-Cracking



Which of the following is the best definition for the term sneaker?

An amateur who hacks a system without being caught

A person who hacks a system to test its vulnerabilities

A person who hacks a system by faking a legitimate password

An amateur hacke - answer-A person who hacks a system to test its vulnerabilities



Which of the following is the best definition of "sensitive information"?

Any information that has monetary value and is protected by any privacy laws

Any information that is worth more thatn $1,000

Military or defense related information

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TOPDOCTOR. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85443 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart