Saint COM510 Chapter 1 Module Quiz Latest 2020
Ch. 1 – Module Quiz
When solving problems, what is the first step?
Develop possible solutions
Recognize and define the problem
Analyze and compare the possible solutions
Select, implement and evaluate a solution
The C.I.A. triad for computer security includes which of these characteristics?
availability
authorization
accountability
authentication
A malware programs that hides its true nature, and reveals its designed behavior only when activated is called a(n) ____________.
Trojan horse
Virus
Spam
Worm
An act where people enter real or virtual premises or systems they have not been authorized to enter is called ____________.
security
theft
trespass
bypass
What function will an audit log provide when it is configured to track user activity on an information system?
authorization
identification
authentication
accountability
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?
programs
planning
people
policy
A long-term interruption in electrical power availability is known as a(n) ____________.
fault
blackout
brownout
lag
A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called a ____________.
man-in-the-middle
sniff-in-the-middle
zombie-in-the-middle
server-in-the-middle
A feature left behind by system designers or maintenance staff or that is placed by a hacker once they have compromised a system to allows quick access to a system at a later time by bypassing access controls is a(n) ____________?
brute force
DoS
back door
hoax
Which type of attack involves sending a large number of connection or information requests to a target?
spear fishing
denial-of-service (DoS)
brute force
malicious code

Having Trouble Meeting Your Deadline?
Get your assignment on Saint COM510 Chapter 1 Module Quiz Latest 2020 completed on time. avoid delay and – ORDER NOW