Front | Back |
According to the 2007 FBI Computer Crime and Security Survey, the loss due to the theft of confidential data for 494 respondents was approximately ____.a. $1 million b. $10 million c. $50 million d. $100 million
|
$10 million
|
The _____ Act is designed to broaden the surveillance of law enforcement agencies so they can detect and suppress terrorism.a. Gramm-Leach-Bliley b. Sarbanes-Oxley c. California Database Security Breach d. USA Patriot
|
USA Patriot
|
According to the research group Postini, over ____ of daily email messages are unsolicited and could be carrying a malicious payload.
a. one-third b. two-thirds c. three-fourths d. four-fifths
|
Two-thirds
|
A ____ is a program advertised as performing one activity but actually does something else. a. script b. virus c. Trojan d. worm
|
Trojan
|
One type of virtualization in which an entire operating system environment is simulated is known as ____ virtualization.
a. NOS b. guest c. operating system d. host
|
Operating system
|
____ typically involves using client-side scripts written in JavaScript that are designed to extract information from the victim and then pass the information to the attacker.a. Spam b. SQL injection c. Cross-site scripting (XSS) d. SQL scripting
|
Cross-site scripting (XSS)
|
____ is a process of ensuring that any inputs are “clean” and will not corrupt the system. a. Cross-site scripting b. SQL injection c. Script injection d. Input validation
|
Input validation
|
____ are active Internet connections that download a specific file that is available through a tracker. a. Torrents b. Applets c. ActiveX controls d. Scripts
|
Torrents
|
With wireless CSMA/CA, the amount of time that a device must wait after the medium is clear is called the ____.a. collision time b. slot time c. clear time d. tx time
|
Slot time
|
The most common type of antenna for war driving is an omnidirectional antenna, also known as a ____ antenna.a. bipole b. dipole c. GPS d. tagging
|
Dipole
|
____ is the name given to a wireless technology that uses short-range RF transmissions. a. Bluetooth b. Piconet c. Scatternet d. Wi-fi
|
Bluetooth
|
____ is the unauthorized access of information from a wireless device through a Bluetooth connection.
a. Blue jacking b. Bluesnarfing c. Blue poisoning d. Blue spoofing
|
Bluesnarfing
|
____, networks can essentially be divided into three parts: network, subnet, and host. a. classful addressing b. subnetting c. stateful addressing d. stateless addressing
|
Subnetting
|
____ IP addresses are not assigned to any specific user or organization; instead, they can be used by any user on the private internal network.
a. Public b. Virtual c. DMZ d. Private
|
Private
|
____ packet filtering keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base.a. Stateless b. Stateful c. Classful d. Classless
|
Stateful
|