A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.

A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.



Answer: Uninterruptable power supply

The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.

The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.



Answer: deatiled

The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.

The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.



Answer: informal

The term ________ refers to a document that details not only the overall security objectives and strategies, but also procedural policies that define acceptable behavior, expected practices, and responsibilities.

The term ________ refers to a document that details not only the overall security objectives and strategies, but also procedural policies that define acceptable behavior, expected practices, and responsibilities.



Answer: security policy

_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available.

_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available.



Answer: off-by-one

The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and the transport layer and does not provide network-layer gateway services.

The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and the transport layer and does not provide network-layer gateway services.



Answer: SOCKS

The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.

The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.



Answer: firewall

A Japanese therapy designed to help clients discover personal guilt for having been ungrateful and troublesome to others and to develop gratitude toward those who have helped them is known as ____.

A Japanese therapy designed to help clients discover personal guilt for having been ungrateful and troublesome to others and to develop gratitude toward those who have helped them is known as ____. 



a. Kyoto therapy
b. Okado therapy
c. Naikan therapy
d. Nissan therapy


Answer: c. Naikan therapy

In electroconvulsive therapy (ECT), ______.

In electroconvulsive therapy (ECT), ______.



a. current is never applied to the left hemisphere
b. convulsions activate the central and peripheral nervous systems, stimulate hormone and neurotransmitter release, and change the blood-brain barrier
c. convulsions are extremely painful long lasting
d. most patient today receive hundreds of treatments because it is safer than in the past


Answer: b. convulsions activate the central and peripheral nervous systems, stimulate hormone and neurotransmitter release, and change the blood-brain barrier