• Home
  • Ask a Question
  • About
  • Contact
  • Advertise
  • Sitemap
MENU

Fill in the blank

  • Home
  • History
  • Translate
Archive for September 2018

Privacy is broken down into four major areas: anonymity, unlinkability, unobservability, and _________.

Add Comment
Privacy is broken down into four major areas: anonymity, unlinkability, unobservability, and _________. Answer: psedonymi...

The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.

Add Comment
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13. Answer: Children's Online...

A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.

Add Comment
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution...

A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.

Add Comment
A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter,...

The three types of patents are: utility patents, design patents, and ________.

Add Comment
The three types of patents are: utility patents, design patents, and ________. Answer: plant patent...

The right to seek civil recourse against anyone infringing his or her property is granted to the ________.

Add Comment
The right to seek civil recourse against anyone infringing his or her property is granted to the ________. Answer: IP owne...

The invasion of the rights secured by patents, copyrights, and trademarks is ________.

Add Comment
The invasion of the rights secured by patents, copyrights, and trademarks is ________. Answer: infringemen...

The U.S. legal system distinguishes three primary types of property: real property, personal property, and _________ property.

Add Comment
The U.S. legal system distinguishes three primary types of property: real property, personal property, and _________ property. Answer: intellectu...

The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.

Add Comment
The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques,...

The most essential element of recovery from physical security breaches is ____.

Add Comment
The most essential element of recovery from physical security breaches is ____. Answer: redundanc...

A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.

Add Comment
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector,...

Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.

Add Comment
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________. Answer:...

Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.

Add Comment
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse. Answer: vandalis...

________ physical threats are more difficult to deal with than environmental and technical threats.

Add Comment
________ physical threats are more difficult to deal with than environmental and technical threats. Answer: human-cause...

An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.

Add Comment
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation. Answer: undervoltag...

Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.

Add Comment
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________. Answer: nois...

_______ threats encompass threats related to electrical power and electromagnetic emission.

Add Comment
_______ threats encompass threats related to electrical power and electromagnetic emission. Answer: technica...

_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.

Add Comment
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain. Answer:...

Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.

Add Comment
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats. Answer: techni...

_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems.

Add Comment
_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain...

The _________ provides the most accurate evaluation of an organization's IT system's security risks.

Add Comment
The _________ provides the most accurate evaluation of an organization's IT system's security risks. Answer: detailed security risk analysis appr...

The _________ approach combines elements of the baseline, informal, and detailed risk analysis approaches.

Add Comment
The _________ approach combines elements of the baseline, informal, and detailed risk analysis approaches. Answer: combine...

Not proceeding with the activity or system that creates the risk is _________.

Add Comment
Not proceeding with the activity or system that creates the risk is _________. Answer: risk avoidanc...

_________ is sharing responsibility for the risk with a third party.

Add Comment
_________ is sharing responsibility for the risk with a third party. Answer: risk transfe...

The level of risk the organization views as acceptable is the organization's __________.

Add Comment
The level of risk the organization views as acceptable is the organization's __________. Answer: risk appetit...

A(n) _________ is anything that has value to the organization.

Add Comment
A(n) _________ is anything that has value to the organization. Answer: asse...

A(n) _________ is a weakness in an asset or group of assets that can be exploited by one or more threats.

Add Comment
A(n) _________ is a weakness in an asset or group of assets that can be exploited by one or more threats. Answer: vulnerabilit...

The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.

Add Comment
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's...

The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.

Add Comment
The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential...

The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents, codes of practice, and industry best practice.

Add Comment
The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents, codes of...

The four approaches to identifying and mitigating risks to an organization's IT infrastructure are: baseline approach, detailed risk analysis, combined approach, and __________ approach.

Add Comment
The four approaches to identifying and mitigating risks to an organization's IT infrastructure are: baseline approach, detailed risk analysis, combined...

The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.

Add Comment
The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources...

The term ________ refers to a document that details not only the overall security objectives and strategies, but also procedural policies that define acceptable behavior, expected practices, and responsibilities.

Add Comment
The term ________ refers to a document that details not only the overall security objectives and strategies, but also procedural policies that define...

ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.

Add Comment
ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act. Answer: chec...

_________ is a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and reliability.

Add Comment
_________ is a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and...

In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved frame pointer and return address.

Add Comment
In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved...

Gaps, or __________ , are flagged in the MMU as illegal addresses, and any attempt to access them results in the process being aborted.

Add Comment
Gaps, or __________ , are flagged in the MMU as illegal addresses, and any attempt to access them results in the process being aborted. Answer: guard...

The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it).

Add Comment
The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it). Answer: h...

_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available.

Add Comment
_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to...

A _________ value is named after the miner's bird used to detect poisonous air in a mine and warn miners in time for them to escape.

Add Comment
A _________ value is named after the miner's bird used to detect poisonous air in a mine and warn miners in time for them to escape. Answer: cana...

_________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code.

Add Comment
__________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code. Answer:...

The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.

Add Comment
The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system. Answer: OpenBS...

__________ defenses aim to detect and abort attacks in existing programs.

Add Comment
__________ defenses aim to detect and abort attacks in existing programs. Answer: run-tim...

__________ defenses aim to harden programs to resist attacks in new programs.

Add Comment
__________ defenses aim to harden programs to resist attacks in new programs. Answer: compile-tim...

Shellcode has to be __________, which means it cannot contain any absolute address referring to itself.

Add Comment
Shellcode has to be __________, which means it cannot contain any absolute address referring to itself. Answer: position independen...

An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being overflowed. This code is known as _________ .

Add Comment
An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being...

"Smashing the Stack for Fun and Profit" was a step by step introduction to exploiting stack-based buffer overflow vulnerabilities that was published in Phrack magazine by _________ .

Add Comment
"Smashing the Stack for Fun and Profit" was a step by step introduction to exploiting stack-based buffer overflow vulnerabilities that was published...

A ___________ overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function's stack frame.

Add Comment
A ___________ overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function's stack frame. Answer: stack...

Data is simply an array of _________ .

Add Comment
Data is simply an array of _________ . Answer: byte...

A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer and consequently overwrites adjacent memory locations.

Add Comment
A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer and consequently...

The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.

Add Comment
The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense. Answer: "defense in depth...

A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a __________ system.

Add Comment
A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a __________ system. Answer: UTM (unified...

Snort Inline adds three new rule types: drop, reject, and _________.

Add Comment
Snort Inline adds three new rule types: drop, reject, and _________. Answer: sdro...

__________ anomaly watches for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network.

Add Comment
__________ anomaly watches for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network. Answer: Traf...

_________ matching scans incoming packets for specific byte sequences (the signature) stored in a database of known attacks.

Add Comment
_________ matching scans incoming packets for specific byte sequences (the signature) stored in a database of known attacks. Answer: Patter...

A ___________ makes use of both signature and anomaly detection techniques to identify attacks.

Add Comment
A ___________ makes use of both signature and anomaly detection techniques to identify attacks. Answer: Host-based IP...

__________ protocols operate in networking devices, such as a router or firewall, and will encrypt and compress all traffic going into the WAN and decrypt and uncompress traffic coming from the WAN.

Add Comment
__________ protocols operate in networking devices, such as a router or firewall, and will encrypt and compress all traffic going into the WAN and decrypt...

A ________ uses encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically the Internet.

Add Comment
A ________ uses encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically...

A __________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side.

Add Comment
A __________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other...

Identified as a critical strong point in the network's security, the _________ serves as a platform for an application-level or circuit-level gateway.

Add Comment
Identified as a critical strong point in the network's security, the _________ serves as a platform for an application-level or circuit-level gateway. Answer:...

The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and the transport layer and does not provide network-layer gateway services.

Add Comment
The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and...

An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address _________.

Add Comment
An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address _________. Answer:...

The ________ IP address is the IP address of the system that originated the IP packet.

Add Comment
The ________ IP address is the IP address of the system that originated the IP packet. Answer: sourc...

A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.

Add Comment
A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. Answer: packet filt...

The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.

Add Comment
The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter...

The __________ is the human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying and configuring the IDS.

Add Comment
The __________ is the human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying...

_______ are decoy systems that are designed to lure a potential attacker away from critical systems.

Add Comment
_______ are decoy systems that are designed to lure a potential attacker away from critical systems. Answer: Answer: honey pot...

The role of the muscle can be either _______, _______ , or _______.

Add Comment
The role of the muscle can be either _______, _______ , or _______. Answer: Mover (Agonist), Synergist, Antagoni...

Muscles are ______ and this energy is used to enhance force production.

Add Comment
Muscles are ______ and this energy is used to enhance force production. Answer: Elasti...

If a task is harder, we recruit _____ types of muscle fibers.

Add Comment
If a task is harder, we recruit _____ types of muscle fibers. Answer: Al...

If a task is easier, we recruit mainly type ___ muscle fibers.

Add Comment
If a task is easier, we recruit mainly type ___ muscle fibers. Answer: ...

Distance runners have more type __ fibers and sprinters have more type _______ fibers.

Add Comment
Distance runners have more type __ fibers and sprinters have more type _______ fibers. Answer: I, II (a and x...

Most muscle groups contain a ______ of fiber types.

Add Comment
Most muscle groups contain a ______ of fiber types. Answer: Mixtur...

In order to optimize power, movements should be _____ max force and ____ max velocity.

Add Comment
In order to optimize power, movements should be _____ max force and ____ max velocity. Answer: 1/3, 1/...

If moving something heavy, we must do it _______.

Add Comment
If moving something heavy, we must do it _______. Answer: Slowl...

Force and velocity are ______ related.

Add Comment
Force and velocity are ______ related. Answer: Inversel...

Shortened or lengthened muscles are not ideal for generating ________ because of the myofibril heads positions.

Add Comment
Shortened or lengthened muscles are not ideal for generating ________ because of the myofibril heads positions. Answer: Tensio...

The ______ of a muscle affects how much force it creates.

Add Comment
The ______ of a muscle affects how much force it creates. Answer: Lengt...

Sarcomere length and muscle length have a _______ relationship.

Add Comment
Sarcomere length and muscle length have a _______ relationship. Answer: Direc...

As the length of the muscle elongates, the length of the ________ elongates.

Add Comment
As the length of the muscle elongates, the length of the ________ elongates. Answer: Sarcomere (Length...

Penniform muscles produce ______ force than parallel.

Add Comment
Penniform muscles produce ______ force than parallel. Answer: More (Type...

The bigger the _______, the more force produced.

Add Comment
The bigger the _______, the more force produced. Answer: Cross-Section (Thickness...

There is constant communication or ____________ to change the amount of force or how many motor units are needed.

Add Comment
There is constant communication or ____________ to change the amount of force or how many motor units are needed. Answer: Cross-Tal...

If we recruit 100 of 1000 possible motor units, we are using 10% of ______ ______.

Add Comment
If we recruit 100 of 1000 possible motor units, we are using 10% of ______ ______. Answer: Peak Forc...

The more force needed, the more ______ _______ we need to recruit.

Add Comment
The more force needed, the more ______ _______ we need to recruit. Answer: Motor Unit...

Tetanus is also know as ________ ________.

Add Comment
Tetanus is also know as ________ ________. Answer: Tetanic Contractio...

We can't manually control our speed. Doing so requires special equipment like a ________ _______ that only allows movement at one speed.

Add Comment
We can't manually control our speed. Doing so requires special equipment like a ________ _______ that only allows movement at one speed. Answer: Biodex...

Almost all dynamic contractions are also _________.

Add Comment
Almost all dynamic contractions are also _________. Answer: Isotonic (Dynamic...

Isometric actions create tension but not _________; The force is not great enough to overcome resistance.

Add Comment
Isometric actions create tension but not _________; The force is not great enough to overcome resistance. Answer: Movemen...

The Krebs/TCA cycle is the _____ part of aerobic metabolism while the Electron Transport Chain is the ____ part.

Add Comment
The Krebs/TCA cycle is the _____ part of aerobic metabolism while the Electron Transport Chain is the ____ part. Answer: 1st, 2n...

The aerobic metabolism pathways can begin with either lipid, carbohydrate, or protein that is converted to _____________.

Add Comment
The aerobic metabolism pathways can begin with either lipid, carbohydrate, or protein that is converted to _____________. Answer: Acetyl Co...

One minute of use of glycolysis causes lactate to _____ exercise and produce _______.

Add Comment
One minute of use of glycolysis causes lactate to _____ exercise and produce _______. Answer: Slow, Sorenes...

All ways to produce ATP are through ______ _______.

Add Comment
All ways to produce ATP are through ______ _______. Answer: Chemical Reaction...

The energy for cells to do work comes from ____, _____, and _______.

Add Comment
The energy for cells to do work comes from ____, _____, and _______. Answer: Carbohydrates, Proteins, and Lipid...

To continue the contraction cycle, there must be a ______ ______.

Add Comment
To continue the contraction cycle, there must be a ______ ______. Answer: Neural Stimulatio...

Every muscle fiber is innervated by exactly _____ motor neuron.

Add Comment
Every muscle fiber is innervated by exactly _____ motor neuron. Answer: On...

There may be hundreds or ______ of motor units in a muscle.

Add Comment
There may be hundreds or ______ of motor units in a muscle. Answer: Thousand...

Muscles are typically relaxed and must be _______ to contract.

Add Comment
Muscles are typically relaxed and must be _______ to contract. Answer: Signale...

A Japanese therapy designed to help clients discover personal guilt for having been ungrateful and troublesome to others and to develop gratitude toward those who have helped them is known as ____.

Add Comment
A Japanese therapy designed to help clients discover personal guilt for having been ungrateful and troublesome to others and to develop gratitude toward...

ECT is used primarily to treat ____.

Add Comment
ECT is used primarily to treat ____.  a. phobias b. conduct disorders c. severe depression d. schizophrenia Answer: c. schizophren...

In electroconvulsive therapy (ECT), ______.

Add Comment
In electroconvulsive therapy (ECT), ______. a. current is never applied to the left hemisphere b. convulsions activate the central and peripheral...

The effectiveness of antipsychotic drugs is thought to result primarily from blockage of ____ receptors.

Add Comment
The effectiveness of antipsychotic drugs is thought to result primarily from blockage of ____ receptors. a. serotonin b. dopamine c. epinephrine d....

The dramatic reduction in the number of hospitalized patients today compared to past decades is primarily attributable to ____.

Add Comment
The dramatic reduction in the number of hospitalized patients today compared to past decades is primarily attributable to ____. a. biomedical therapy b....

In behavior therapy, ____ techniques use shaping and reinforcement to increase adaptive behaviors.

Add Comment
In behavior therapy, ____ techniques use shaping and reinforcement to increase adaptive behaviors. a. classical conditioning b. modeling c. operant...

A group of techniques used to change maladaptive behaviors is known as ____.

Add Comment
A group of techniques used to change maladaptive behaviors is known as ____. Answer: behavior thera...

____ treats the family as a unit, and members work together to solve problems.

Add Comment
____ treats the family as a unit, and members work together to solve problems. a. aversion therapy b. an encounter group c. a self-help group d....

In ____, multiple people meet together to work toward therapeutic goals.

Add Comment
In ____, multiple people meet together to work toward therapeutic goals. Answer: group thera...

Using Beck's four destructive thought patterns associated with depression, label the following thoughts:

Add Comment
Using Beck's four destructive thought patterns associated with depression, label the following thoughts: a. Mary left me, and I'll never fall in...

Cognitive therapists assume that problem behaviors and emotions are caused by ____.

Add Comment
Cognitive therapists assume that problem behaviors and emotions are caused by ____. Answer: faulty thought processes and belie...
Pages 1 of 30 123NextLast
Subscribe to: Posts (Atom)

Trending Questions

  • If you see raindrops splashing on the surface of the road or if you are forced to drive through a puddle or standing water, __________.
    If you see raindrops splashing on the surface of the road or if you are forced to drive through a puddle or standing water, __________. ...
  • Never ___ on or near a railroad track.
    Never ________ on or near a railroad track. stop
  • A ductless gland that secretes directly into the bloodstream is considered to be a(n) ________ gland.
    A ductless gland that secretes directly into the bloodstream is considered to be a(n) ________ gland. Answer: endocrine
  • If you are teaching a beginner to drive, you must:
    If you are teaching a beginner to drive, you must: Answer: Be a licensed driver age 21 or over
  • In the U.S., each year approximately _______people are injured and around 40,000 people are killed in traffic collisions.
    In the U.S., each year approximately _______people are injured and around 40,000 people are killed in traffic collisions. 3 million ...
  • The Ouchterlony test is a(n) _____________ test.
    The Ouchterlony test is a(n) _____________ test. Answer: double immunodiffusion
  • The __________ are unusual structures associated with the alphaproteobacteria and consist of an extension of the cytoplasm surrounded by the cytoplasmic membrane and cell wall.
    The __________ are unusual structures associated with the alphaproteobacteria and consist of an extension of the cytoplasm surrounded by t...
  • There shall be no use of ________ within an AFD vehicle or apparatus.
    There shall be no use of ________ within an AFD vehicle or apparatus. Answer: any type of tobacco product
  • The number of new bacteriophages released from each infected cell is called the _____________.
    The number of new bacteriophages released from each infected cell is called the _____________. Answer: burst size
  • Media represents a __________ influence.
    Media represents a __________ influence. Answer: broad socialization

Blog Archive

  • July (353)
  • September (109)
  • August (10)
  • July (10)
  • November (3)
  • October (330)
  • September (40)
  • May (9)
  • February (19)
  • December (8)
  • February (63)

Label

A&P Accountancy Achievement in Adolescence Astronomy Biology Biomechanics Bullying Business ethics Computer Security Coupling and Uncoupling Drivers Driving Safely Funeral Service Human Sexuality I Drive Safely I Drive Safely (Texas) Macroeconomics Media Network Object Oriented Programming Problems and Prospect Psychology Psychosocial Problems Radiology Safe Driving Sarcomere length and muscle length have a _______ relationship. Software Engineering Stress
Copyright © 2015 Fill in the blank | Term Of Service | Disclaimer | Privacy Policy | DMCA