The ________ defines stiffer penalties for prosecution of terrorist crimes.
The Federal Bureau of Investigation’s National InfraGard Pro…
The Federal Bureau of Investigation’s National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; maintains a secure Web site for communication about suspicious activity or intrusions; sponsors local chapter activities; and operates a help desk for questions.
In 2002, Congress passed the Federal Information Security Ma…
In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies ________.
Which of the set (or sets) of numbers does the number belon…
Which of the set (or sets) of numbers does the number belong to? There may be more than one answer.
What is the subject of the Computer Security Act?
What is the subject of the Computer Security Act?
A computer is the ________ of an attack when it is used to c…
A computer is the ________ of an attack when it is used to conduct an attack against another computer.
The application of computing and network resources to try ev…
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack.
A hardware system is the entire set of people, procedures, a…
A hardware system is the entire set of people, procedures, and technology that enable business to use information.
One form of e-mail attack that is also a DoS attack is calle…
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail.
In file hashing, a file is read by a special algorithm that…
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the ________ value.