The macro virus infects the key operating system files located in a computers start up sector

TrueFalseQUESTION 4Themacro virus infects the key operating system files located in acomputer’s start-up sector. __________4 pointsSavedQUESTION 5Technology services are usually arranged with an agreementdefining minimum service levels known as a(n) __________.4 pointsSavedQUESTION 6This collaborative support group began as a cooperative effortbetween the FBI’s Cleveland field office and local technologyprofessionals with a focus of protecting critical nationalinfrastructure.CyberWatchCyberGardInfraGardHomeland Security4 pointsSavedQUESTION 7InfraGard began as a cooperative effort between the FBI’sCleveland field office and localintelligence professionals.___________4 pointsSavedQUESTION 84iQuestion Completion Status:Click Save and Submit to save and submit. Click Save All Answers to save all answers.


  • Q29:

    Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________

  • Q30:

    Which of the following functions does information security perform for an organization   A) Protecting the organization's ability to function.  B) Enabling the safe operation of applications implemented on the organization's IT systems.  C) Protecting the data the organization collects and uses.  D) All of the above.

  • Q31:

    When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________

  • Q32:

    Packet munchkins use automated exploits to engage in distributed denial-of-service attacks. _________________________

  • Q33:

    Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________

  • Q35:

    Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________

  • Q36:

    The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________

  • Q37:

    The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. _________________________

  • Q38:

    A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. _________________________

  • Q39:

    One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________

Chapter 02 The Need for Security

TRUEFALSE

1.

Information security's primary mission is to ensure that systems and their contents retain their

confidentiality at any cost.

(A) True

(B) False

Answer : (B)

2.

The information security function in an organization safeguards its technology assets.

(A) True

(B) False

Answer : (A)

3.

As an organization grows, it must often use more robust technology to replace the security

technologies it may have outgrown.

(A) True

(B) False

Answer : (A)

4.

Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay

discovery. The first act is obviously in the category of "theft" but the second act is another

category-in this case it is a "force of nature."

(A) True

(B) False

Answer : (B)

5.

Two watchdog organizations that investigate allegations of software abuse are the Software &

Information Industry Association (SIIA) and National Security Agency (NSA).

(A) True

(B) False

Answer : (B)

What type of virus is written in a macro language and placed in a document or table?

A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word.

What is Information Security's primary mission?

Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.

When voltage levels lag the extra voltage can severely damage or destroy equipment?

When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment. The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack.

What is the difference between machine executable and macro viruses?

Machine executable viruses are attached to some executable program while a macro virus infects the content of popularly used applications. This means that a macro virus tends to be platform independent and you cannot use traditional file system access controls to keep the virus from spreading.