____ ensures that only authorized parties can view the information
What is Confidentiality
100
True or False: XML is designed to carry data instead of indicating how to display it.
What is True
100
A(n) _____ is a set of software tools used by an intruder to break into a computer, obtain special privileges to perform unauthorized functions, and then hide all traces of its existence.
What is Root kit
100
A(n) ____ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
What is Keylogger
100
____ is exploiting a vulnerablity in software to gain access to resources that the user would normally be restricted from obtaining.
What is Privilege Escalation
200
___ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
What is Adware
200
A(n) ____ attack takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories.
What is Directory Traversal
200
______ ensures that data is accessible to authorized users.
What is Availability
200
True or False: Man-in-the-middle attacks cannot be conducted on networks.
What is False
200
___ is a form of tailgating that involves the tailgater colluding with an authorized person.
What is Piggybacking
300
A(n) ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event, such as a certain date reached on th system calendar or a drop below a previous level of a person's rank in an organization.
What is Logic Bomb
300
_____ is a superset of information security including security issues that do not involve computers.
What is Information Assurance
300
___ are privileges that are granted to users to access hardware and software resources.
What is Access Rights
300
An example of ______ in information security would be not revealing the type of computer, version of operating system, or brand of software that is used.
What is Obscurity
300
A(n) _____ is the likelihood that a threat agent will exploit a vulnerability.
What is Risk
400
True or False: Transitive access is an attack involving using a third party to gain access rights.
What is True
400
A(n) ______ is defined as something that has value.
What is Asset
400
___ is a general term used for describing software that imposes upon a user's privacy or security.
What is Spyware
400
A(n) ___ occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
What is Buffer Overflow
400
The motivation of ____ may be defined as ideology, or attacking for the sake of their principles or beliefs.
What is Cyber Terrorists
500
A(n) ___ is a method for adding annotations to the text so that the additions can be distinguished from the text itself.
What is Markup Language
500
A(n) ___ attack uses the Internet Control Message Protocol (ICMP), which is a Network Layer protocol that is part of Transmission control Protocol/Internet Protocol (TCP/IP) to flood a victim with packets.
What is Ping Flood
500
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as __________.
What is Cybercrime
500
A(n) _____ is a program that secretly attaches itself to a legitimate "carrier," such as a document or program, and then executes when that document is opened or program is launched.
What is Computer Virus
500
____ is a systematic and methodical evaluation of the exposure of assest to attackers, forces of nature, or any other entity that is potentially harmful.