Ready to test your Knowledge?
Try out our new practice tests completely free!
exam preparation banner icon

Network Defense

Computing

Quiz 14 :

Choosing Defense Strategies

Quiz 14 :

Choosing Defense Strategies

search
arrow
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:
Free
Multiple Choice
Answer:

Answer:

D

arrow
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:
Free
Multiple Choice
Answer:

Answer:

B

arrow
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?
Free
Multiple Choice
Answer:

Answer:

C

arrow
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
Short Answer
Answer:
arrow
In which attack did the hacker sign off with the statement "You have yet to see true electronic terrorism.This is a promise."?
Multiple Choice
Answer:
arrow
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:
Multiple Choice
Answer:
arrow
Which is NOT an encryption program discussed by the author?
Multiple Choice
Answer:
arrow
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?
Multiple Choice
Answer:
arrow
Which is LEAST likely to provide access to sensitive data to unauthorized people?
Multiple Choice
Answer:
arrow
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
Short Answer
Answer:
arrow
Attempting to acquire information to which one does not have legitimate access is called ____________.
Short Answer
Answer:
arrow
Which is a multi-platform packet sniffer?
Multiple Choice
Answer:
arrow
Use of computers and their Internet connectivity to launch terrorist attacks is called:
Multiple Choice
Answer:
arrow
Where did the first known attack by terrorists against a country's computer systems occur?
Multiple Choice
Answer:
arrow
Which permits a user to read sensitive data without ever having physical access to the target system?
Multiple Choice
Answer:
arrow
Which is likely to be a more threatening type of computer attack?
Multiple Choice
Answer:
arrow
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?
Multiple Choice
Answer:
arrow
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
Short Answer
Answer:
arrow
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
Short Answer
Answer:
arrow
What does the author say is the only reason that there have not been more damaging and more frequent terrorist attacks against computer systems?
Multiple Choice
Answer:
Showing 1 - 20 of 24