Saint COM510 Chapter 1 Module Quiz Latest 2020

Question

Dot Image

Ch. 1 – Module Quiz

When solving problems, what is the first step?

             Develop possible solutions

             Recognize and define the problem

             Analyze and compare the possible solutions

             Select, implement and evaluate a solution

The C.I.A. triad for computer security includes which of these characteristics?

             availability

             authorization

             accountability

             authentication

A malware programs that hides its true nature, and reveals its designed behavior only when activated is called a(n) ____________.

             Trojan horse

             Virus

             Spam

             Worm

An act where people enter real or virtual premises or systems they have not been authorized to enter is called ____________.

             security

             theft

             trespass

             bypass

What function will an audit log provide when it is configured to track user activity on an information system?

             authorization

             identification

             authentication

             accountability

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?

             programs

             planning

             people

             policy

A long-term interruption in electrical power availability is known as a(n) ____________.

             fault

             blackout

             brownout

             lag

A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called a ____________.

             man-in-the-middle

             sniff-in-the-middle

             zombie-in-the-middle

             server-in-the-middle

A feature left behind by system designers or maintenance staff or that is placed by a hacker once they have compromised a system to allows quick access to a system at a later time by bypassing access controls is a(n) ____________?

             brute force

             DoS

             back door

             hoax

Which type of attack involves sending a large number of connection or information requests to a target?

             spear fishing

             denial-of-service (DoS)

             brute force

             malicious code

 

Having Trouble Meeting Your Deadline?

Get your assignment on Saint COM510 Chapter 1 Module Quiz Latest 2020 completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts