Principal Info Sys Security Quiz

Submitted by: Submitted by

Views: 181

Words: 485

Pages: 2

Category: Other Topics

Date Submitted: 04/07/2013 08:03 PM

Report This Essay

1. (TCO 1) Why is the Morris Worm significant? (Points : 3) |

       It placed embarrassing text on people's screens.

       This was the first large-scale attack on the Internet.

       It was the very first virus on the Internet.

       It attacked the Windows operating system.

|

2. (TCO 1) Background checks, drug testing, retirement, and termination are elements found in what type of policy? (Points : 3) |

       Due diligence

       Human resources

       Equal opportunity

       Privacy

|

3. (TCO 1) The term hacktivist refers to _____. (Points : 3) |

       a hacker who works for the government

       a hacker with low technical ability

       a hacker motivated by a political agenda

       a hacker who can write scripts

|

4. (TCO 1) What is a Solar Sunrise? (Points : 3) |

       An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel

       Electronic interference resulting from solar flares and occurring most commonly in the early morning hours

       A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures

       The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice

|

5. (TCO 1) What is an elite hacker? (Points : 3) |

       A hacker with a high level of technical ability

       A hacker who is wealthy and who is politically motivated

       A hacker who has elitist ideas and hacks for political purposes

       A hacker who searches for scripts and ready-made tools to use for attacks

|

6. (TCO 1) When information is modified by individuals who are not authorized to change it, a _____ has been suffered. (Points : 3) |

       loss of confidentiality

       loss of integrity

       loss of functionality

       loss of availability

|

7. (TCO 1) According to the Computer Crime and...