ITSY 1300 exam 1
Study online at https://quizlet.com/_379fs3
1. Which term below is frequently used to describe the information security
tasks of securing information that is in a digital format?
2. What language below is used to view and manipulate SQL
data that is stored in a relational database?
3. What type of attack is targeted against a smaller group Watering Hole
of specific individuals, such as the major executives
working for a manufacturing company?
4. What type of theft involves stealing another person's Identity theft
personal information, such as a Social Security num-
ber, and then using the information to impersonate
the victim, generally for financial gain?
5. A Hardware Security Module (HSM) is essentially a chip False
on the motherboard of the computer that provides
cryptographic services.
6. XSS attacks occur when an attacker takes advantage True
of web applications that accept user input without val-
idating it and then present it back to the user.
7. An independently rotating large cup affixed to the top roller barrier
of a fence prevents the hands of intruders from grip-
ping the top of a fence to climb over it. What is the
name for this technology?
8. In information security, an example of a threat agent - a force of nature such as a
can be ____. tornado that could destroy
computer equipment
- a virus that attacks a
computer network
, ITSY 1300 exam 1
Study online at https://quizlet.com/_379fs3
- A person attempting to
break into a secure com-
puter network
9. Script kiddies acquire which item below from other Exploit kit
attackers to easily craft an attack:
10. What type of device, sometimes called a packet filter, firewall
is designed to prevent malicious network packets from
entering or leaving computers or networks?
11. Of the three types of mutating malware, what type Oligomorphic malware
changes its internal code to one of a set number of
predefined mutations whenever it is executed?
12. What is the name of the open source asymmetric cryp- GPG
tography system that runs on Windows, UNIX, and
Linux systems, and is compatible with PGP?
13. In what kind of attack can attackers make use of hun- distributed
dreds of thousands of computers under their control
in an attack against a single server or network?
14. Anti-virus products typically utilize what type of virus Static analysis
scanning analysis?
15. The physical procedure whereby an unauthorized per- Tailgating
son gains access to a location by following an autho-
rized user is known as?
16. Select below the term that is used to describe indi- Script kiddies
viduals who want to attack computers yet lack the
knowledge of computers and networks needed to do
so:
Study online at https://quizlet.com/_379fs3
1. Which term below is frequently used to describe the information security
tasks of securing information that is in a digital format?
2. What language below is used to view and manipulate SQL
data that is stored in a relational database?
3. What type of attack is targeted against a smaller group Watering Hole
of specific individuals, such as the major executives
working for a manufacturing company?
4. What type of theft involves stealing another person's Identity theft
personal information, such as a Social Security num-
ber, and then using the information to impersonate
the victim, generally for financial gain?
5. A Hardware Security Module (HSM) is essentially a chip False
on the motherboard of the computer that provides
cryptographic services.
6. XSS attacks occur when an attacker takes advantage True
of web applications that accept user input without val-
idating it and then present it back to the user.
7. An independently rotating large cup affixed to the top roller barrier
of a fence prevents the hands of intruders from grip-
ping the top of a fence to climb over it. What is the
name for this technology?
8. In information security, an example of a threat agent - a force of nature such as a
can be ____. tornado that could destroy
computer equipment
- a virus that attacks a
computer network
, ITSY 1300 exam 1
Study online at https://quizlet.com/_379fs3
- A person attempting to
break into a secure com-
puter network
9. Script kiddies acquire which item below from other Exploit kit
attackers to easily craft an attack:
10. What type of device, sometimes called a packet filter, firewall
is designed to prevent malicious network packets from
entering or leaving computers or networks?
11. Of the three types of mutating malware, what type Oligomorphic malware
changes its internal code to one of a set number of
predefined mutations whenever it is executed?
12. What is the name of the open source asymmetric cryp- GPG
tography system that runs on Windows, UNIX, and
Linux systems, and is compatible with PGP?
13. In what kind of attack can attackers make use of hun- distributed
dreds of thousands of computers under their control
in an attack against a single server or network?
14. Anti-virus products typically utilize what type of virus Static analysis
scanning analysis?
15. The physical procedure whereby an unauthorized per- Tailgating
son gains access to a location by following an autho-
rized user is known as?
16. Select below the term that is used to describe indi- Script kiddies
viduals who want to attack computers yet lack the
knowledge of computers and networks needed to do
so: