Name:
Class:
Date:
Chapter 01: Introduction to the Management of Information Security True / False 1. Corruption of information can occur only while information is being stored. a. True b. False ANSWER: False 2. The authorization process takes place before the authentication process. a. True b. False ANSWER: False 3. A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. a. True b. False ANSWER: True 4. DoS attacks cannot be launched against routers. a. True b. False ANSWER: False 5. The first step in solving problems is to gather facts and make assumptions. a. True b. False ANSWER: False Modified True / False 6. A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. __________ ANSWER: False - packet 7. One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. __________ ANSWER: False - bomb 8. When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. __________ ANSWER: False - spike 9. "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. __________ ANSWER: False - surfing 10. The term phreaker is now commonly associated with an individual who cracks or removes software protection that is Copyright Cengage Learning. Powered by Cognero.
Page 1