Information security architecture often relies on boundaries outside the computer to protect important information or programs from error prone or
... [Show More] malicious programs. - ANSWER False
A security analyst is performing a security assessment. The analyst should not: - ANSWER Take actions to mitigate a serious risk
A rational security decision, such as locking your vehicle when not in use, is an example of: - ANSWER reasoned paranoia
- ANSWER 3
What is a worm? - ANSWER Malware
A vulnerability is a security measure intended to protect an asset. - ANSWER False
Victims can protect themselves against zero-day attacks. - ANSWER False
______________ a person who has learned specific attacks on computer systems and can use those specific attacks. - ANSWER Cracker
When disclosing a security vulnerability in a system or software, the manufacturer should avoid: - ANSWER Including enough detail to allow an attacker to exploit the vulnerability
The term "security theater" refers to security measures intended to make potential victims feel safe and secure without regard to their effectiveness. - ANSWER true
Security Category RMF begins with a high level estimate of the impact caused by cyber security failures. - ANSWER true
A threat agent is a person who did attack our assets, an attacker might attack an asset. - ANSWER false
CIA properties do not include: - ANSWER authentication
Authentication is a security service that ensures information is reliably available. - ANSWER False
Zero Day vulnerability is one that has been reported to the software's vendor and the general public. - ANSWER False
The fundamental job of every operating system is to run programs, and this relies on: - ANSWER -process management
-random access memory (RAM) management
-input/output (I/O) management
One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is to: - ANSWER report the status of the individual computer users
The type of computer-based access control that involves a process that uses secret or hidden information in order to retrieve particular data items is: - ANSWER puzzle
The process of loading and running a program from a mass storage device like a hard drive or CD-ROM is called: - ANSWER bootstrapping
A type of security control that takes measures to help restore a system is referred to as: - ANSWER corrective
Steganography is a type of vault computer-based access control. - ANSWER False
A computer's Basic Input/Output System (BIOS) is a computer program stored in read-only memory (ROM). - ANSWER True
A stack provides a simple, structured way to give temporary storage to a procedure, including a place to save the return address. - ANSWER True
Part of the reason why the Morris worm was successful was that the finger process had Least Privilege instead of Most Privilege. - ANSWER False
Everything a computer does, right or wrong, results from running a computer program written by people. - ANSWER True
To switch between two processes, the operating system maintains a collection of data called the ____________ - ANSWER Process State
____________ flaws in the software such as finger service are often exploited. - ANSWER Buffer Overflow
As with CERT Advisories, the system relies on the discovery of vulnerabilities by vendors or other interested parties, and the reporting of these vulnerabilities through the ___________ process. - ANSWER CVE
As with threat agents, attacks do not affect non-cyber resources. - ANSWER False
In a hierarchical file system directory, the topmost directory is called the: - ANSWER Root [Show Less]