ITS 221 ch1-3

Exit

Question 1 of 1

  Time Left


0 [{"id":370517,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:13:22","updated_at":"2018-02-01 18:48:57","questionName":"A server would experience a __________ attack when a hacker compromises it to acquire information from it from a remote location using a network connection.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370516,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:12:47","updated_at":"2018-02-01 18:48:57","questionName":"__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370511,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:09:37","updated_at":"2018-02-01 18:48:57","questionName":"To achieve balance; that is, to operate an information system that satisfies the user and the security professional; the security level must allow reasonable access, yet protect against threats.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370504,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:07:12","updated_at":"2018-02-01 18:48:57","questionName":"Network security focuses on the protection of the details of a particular operation or series of activities.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370515,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:12:08","updated_at":"2018-02-01 18:48:57","questionName":"__________ was the first operating system to integrate security as its core functions.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370505,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:07:34","updated_at":"2018-02-01 18:48:57","questionName":"The value of information comes from the characteristics it possesses.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370509,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:08:56","updated_at":"2018-02-01 18:48:57","questionName":"A breach of possession always results in a breach of confidentiality.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370507,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:08:12","updated_at":"2018-02-01 18:48:57","questionName":"An e-mail virus involves sending an e-mail message with a modified field.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370512,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:09:58","updated_at":"2018-02-01 18:48:57","questionName":"The bottom-up approach to information security has a higher probability of success than the top-down approach.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370503,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:06:49","updated_at":"2018-02-01 18:48:57","questionName":"During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370514,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:11:26","updated_at":"2018-02-01 18:48:57","questionName":"The famous study entitled \u201cProtection Analysis: Final Report\u201d focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370510,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:09:12","updated_at":"2018-02-01 18:48:57","questionName":"Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370513,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:10:39","updated_at":"2018-02-01 18:48:57","questionName":"__________ is a network project that preceded the Internet.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370506,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:07:54","updated_at":"2018-02-01 18:48:57","questionName":"When a computer is the subject of an attack, it is the entity being attacked.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":370508,"quiz_id":"18797","answer_id":null,"answerType_id":"0","created_at":"2018-02-01 18:08:36","updated_at":"2018-02-01 18:48:57","questionName":"The possession of information is the quality or state of having value for some purpose or end.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
370517
0
120
block

A server would experience a __________ attack when a hacker compromises it to acquire information from it from a remote location using a network connection.

Select the correct answer(s).  

(0/0)












370516
0
120
none
370511
0
120
none
370504
0
120
none
370515
0
120
none
370505
0
120
none
370509
0
120
none
370507
0
120
none
370512
0
120
none
370503
0
120
none
370514
0
120
none
370510
0
120
none
370513
0
120
none
370506
0
120
none
370508
0
120
none