Privacy is broken down into four major areas: anonymity, unlinkability, unobservability, and _________.
Answer: psedonymi...
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
Answer: Children's Online...
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution...
A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.
A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter,...
The three types of patents are: utility patents, design patents, and ________.
The three types of patents are: utility patents, design patents, and ________.
Answer: plant patent...
The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
Answer: IP owne...
The invasion of the rights secured by patents, copyrights, and trademarks is ________.
The invasion of the rights secured by patents, copyrights, and trademarks is ________.
Answer: infringemen...
The U.S. legal system distinguishes three primary types of property: real property, personal property, and _________ property.
The U.S. legal system distinguishes three primary types of property: real property, personal property, and _________ property.
Answer: intellectu...
The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.
The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques,...
The most essential element of recovery from physical security breaches is ____.
The most essential element of recovery from physical security breaches is ____.
Answer: redundanc...
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector,...
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
Answer:...
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
Answer: vandalis...
________ physical threats are more difficult to deal with than environmental and technical threats.
________ physical threats are more difficult to deal with than environmental and technical threats.
Answer: human-cause...
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
Answer: undervoltag...
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
Answer: nois...
_______ threats encompass threats related to electrical power and electromagnetic emission.
_______ threats encompass threats related to electrical power and electromagnetic emission.
Answer: technica...
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
Answer:...
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
Answer: techni...
_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems.
_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain...
The _________ provides the most accurate evaluation of an organization's IT system's security risks.
The _________ provides the most accurate evaluation of an organization's IT system's security risks.
Answer: detailed security risk analysis appr...
The _________ approach combines elements of the baseline, informal, and detailed risk analysis approaches.
The _________ approach combines elements of the baseline, informal, and detailed risk analysis approaches.
Answer: combine...
Not proceeding with the activity or system that creates the risk is _________.
Not proceeding with the activity or system that creates the risk is _________.
Answer: risk avoidanc...
_________ is sharing responsibility for the risk with a third party.
_________ is sharing responsibility for the risk with a third party.
Answer: risk transfe...
The level of risk the organization views as acceptable is the organization's __________.
The level of risk the organization views as acceptable is the organization's __________.
Answer: risk appetit...
A(n) _________ is anything that has value to the organization.
A(n) _________ is anything that has value to the organization.
Answer: asse...
A(n) _________ is a weakness in an asset or group of assets that can be exploited by one or more threats.
A(n) _________ is a weakness in an asset or group of assets that can be exploited by one or more threats.
Answer: vulnerabilit...
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's...
The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.
The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential...
The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents, codes of practice, and industry best practice.
The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents, codes of...
The four approaches to identifying and mitigating risks to an organization's IT infrastructure are: baseline approach, detailed risk analysis, combined approach, and __________ approach.
The four approaches to identifying and mitigating risks to an organization's IT infrastructure are: baseline approach, detailed risk analysis, combined...
The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.
The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources...
The term ________ refers to a document that details not only the overall security objectives and strategies, but also procedural policies that define acceptable behavior, expected practices, and responsibilities.
The term ________ refers to a document that details not only the overall security objectives and strategies, but also procedural policies that define...
ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.
ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.
Answer: chec...
_________ is a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and reliability.
_________ is a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and...
In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved frame pointer and return address.
In the classic __________ overflow, the attacker overwrites a buffer located in the local variable area of a stack frame and then overwrites the saved...
Gaps, or __________ , are flagged in the MMU as illegal addresses, and any attempt to access them results in the process being aborted.
Gaps, or __________ , are flagged in the MMU as illegal addresses, and any attempt to access them results in the process being aborted.
Answer: guard...
The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it).
The _________ is typically located above the program code and global data and grows up in memory (while the sack grows down toward it).
Answer: h...
_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to a coding error, allows just one more byte to be copied than there is space available.
_________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred, but due to...
A _________ value is named after the miner's bird used to detect poisonous air in a mine and warn miners in time for them to escape.
A _________ value is named after the miner's bird used to detect poisonous air in a mine and warn miners in time for them to escape.
Answer: cana...
_________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code.
__________ is one of the best known protection mechanisms that is a GCC compiler extension that inserts additional function entry and exit code.
Answer:...
The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.
The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.
Answer: OpenBS...
__________ defenses aim to detect and abort attacks in existing programs.
__________ defenses aim to detect and abort attacks in existing programs.
Answer: run-tim...
__________ defenses aim to harden programs to resist attacks in new programs.
__________ defenses aim to harden programs to resist attacks in new programs.
Answer: compile-tim...
Shellcode has to be __________, which means it cannot contain any absolute address referring to itself.
Shellcode has to be __________, which means it cannot contain any absolute address referring to itself.
Answer: position independen...
An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being overflowed. This code is known as _________ .
An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being...
"Smashing the Stack for Fun and Profit" was a step by step introduction to exploiting stack-based buffer overflow vulnerabilities that was published in Phrack magazine by _________ .
"Smashing the Stack for Fun and Profit" was a step by step introduction to exploiting stack-based buffer overflow vulnerabilities that was published...
A ___________ overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function's stack frame.
A ___________ overflow occurs when the targeted buffer is located on the stack, usually as a local variable in a function's stack frame.
Answer: stack...
Data is simply an array of _________ .
Data is simply an array of _________ .
Answer: byte...
A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer and consequently overwrites adjacent memory locations.
A __________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer and consequently...
The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.
The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.
Answer: "defense in depth...
A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a __________ system.
A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a __________ system.
Answer: UTM (unified...
Snort Inline adds three new rule types: drop, reject, and _________.
Snort Inline adds three new rule types: drop, reject, and _________.
Answer: sdro...
__________ anomaly watches for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network.
__________ anomaly watches for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network.
Answer: Traf...
_________ matching scans incoming packets for specific byte sequences (the signature) stored in a database of known attacks.
_________ matching scans incoming packets for specific byte sequences (the signature) stored in a database of known attacks.
Answer: Patter...
A ___________ makes use of both signature and anomaly detection techniques to identify attacks.
A ___________ makes use of both signature and anomaly detection techniques to identify attacks.
Answer: Host-based IP...
__________ protocols operate in networking devices, such as a router or firewall, and will encrypt and compress all traffic going into the WAN and decrypt and uncompress traffic coming from the WAN.
__________ protocols operate in networking devices, such as a router or firewall, and will encrypt and compress all traffic going into the WAN and decrypt...
A ________ uses encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically the Internet.
A ________ uses encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically...
A __________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side.
A __________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other...
Identified as a critical strong point in the network's security, the _________ serves as a platform for an application-level or circuit-level gateway.
Identified as a critical strong point in the network's security, the _________ serves as a platform for an application-level or circuit-level gateway.
Answer:...
The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and the transport layer and does not provide network-layer gateway services.
The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and...
An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address _________.
An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address _________.
Answer:...
The ________ IP address is the IP address of the system that originated the IP packet.
The ________ IP address is the IP address of the system that originated the IP packet.
Answer: sourc...
A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
Answer: packet filt...
The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.
The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter...
The __________ is the human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying and configuring the IDS.
The __________ is the human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying...
_______ are decoy systems that are designed to lure a potential attacker away from critical systems.
_______ are decoy systems that are designed to lure a potential attacker away from critical systems.
Answer: Answer: honey pot...
The role of the muscle can be either _______, _______ , or _______.
The role of the muscle can be either _______, _______ , or _______.
Answer: Mover (Agonist), Synergist, Antagoni...
Muscles are ______ and this energy is used to enhance force production.
Muscles are ______ and this energy is used to enhance force production.
Answer: Elasti...
If a task is harder, we recruit _____ types of muscle fibers.
If a task is harder, we recruit _____ types of muscle fibers.
Answer: Al...
If a task is easier, we recruit mainly type ___ muscle fibers.
If a task is easier, we recruit mainly type ___ muscle fibers.
Answer: ...
Distance runners have more type __ fibers and sprinters have more type _______ fibers.
Distance runners have more type __ fibers and sprinters have more type _______ fibers.
Answer: I, II (a and x...
Most muscle groups contain a ______ of fiber types.
Most muscle groups contain a ______ of fiber types.
Answer: Mixtur...
In order to optimize power, movements should be _____ max force and ____ max velocity.
In order to optimize power, movements should be _____ max force and ____ max velocity.
Answer: 1/3, 1/...
If moving something heavy, we must do it _______.
If moving something heavy, we must do it _______.
Answer: Slowl...
Force and velocity are ______ related.
Force and velocity are ______ related.
Answer: Inversel...
Shortened or lengthened muscles are not ideal for generating ________ because of the myofibril heads positions.
Shortened or lengthened muscles are not ideal for generating ________ because of the myofibril heads positions.
Answer: Tensio...
The ______ of a muscle affects how much force it creates.
The ______ of a muscle affects how much force it creates.
Answer: Lengt...
Sarcomere length and muscle length have a _______ relationship.
Sarcomere length and muscle length have a _______ relationship.
Answer: Direc...
As the length of the muscle elongates, the length of the ________ elongates.
As the length of the muscle elongates, the length of the ________ elongates.
Answer: Sarcomere (Length...
Penniform muscles produce ______ force than parallel.
Penniform muscles produce ______ force than parallel.
Answer: More (Type...
The bigger the _______, the more force produced.
The bigger the _______, the more force produced.
Answer: Cross-Section (Thickness...
There is constant communication or ____________ to change the amount of force or how many motor units are needed.
There is constant communication or ____________ to change the amount of force or how many motor units are needed.
Answer: Cross-Tal...
If we recruit 100 of 1000 possible motor units, we are using 10% of ______ ______.
If we recruit 100 of 1000 possible motor units, we are using 10% of ______ ______.
Answer: Peak Forc...
The more force needed, the more ______ _______ we need to recruit.
The more force needed, the more ______ _______ we need to recruit.
Answer: Motor Unit...
Tetanus is also know as ________ ________.
Tetanus is also know as ________ ________.
Answer: Tetanic Contractio...
We can't manually control our speed. Doing so requires special equipment like a ________ _______ that only allows movement at one speed.
We can't manually control our speed. Doing so requires special equipment like a ________ _______ that only allows movement at one speed.
Answer: Biodex...
Almost all dynamic contractions are also _________.
Almost all dynamic contractions are also _________.
Answer: Isotonic (Dynamic...
Isometric actions create tension but not _________; The force is not great enough to overcome resistance.
Isometric actions create tension but not _________; The force is not great enough to overcome resistance.
Answer: Movemen...
The Krebs/TCA cycle is the _____ part of aerobic metabolism while the Electron Transport Chain is the ____ part.
The Krebs/TCA cycle is the _____ part of aerobic metabolism while the Electron Transport Chain is the ____ part.
Answer: 1st, 2n...
The aerobic metabolism pathways can begin with either lipid, carbohydrate, or protein that is converted to _____________.
The aerobic metabolism pathways can begin with either lipid, carbohydrate, or protein that is converted to _____________.
Answer: Acetyl Co...
One minute of use of glycolysis causes lactate to _____ exercise and produce _______.
One minute of use of glycolysis causes lactate to _____ exercise and produce _______.
Answer: Slow, Sorenes...
All ways to produce ATP are through ______ _______.
All ways to produce ATP are through ______ _______.
Answer: Chemical Reaction...
The energy for cells to do work comes from ____, _____, and _______.
The energy for cells to do work comes from ____, _____, and _______.
Answer: Carbohydrates, Proteins, and Lipid...
To continue the contraction cycle, there must be a ______ ______.
To continue the contraction cycle, there must be a ______ ______.
Answer: Neural Stimulatio...
Every muscle fiber is innervated by exactly _____ motor neuron.
Every muscle fiber is innervated by exactly _____ motor neuron.
Answer: On...
There may be hundreds or ______ of motor units in a muscle.
There may be hundreds or ______ of motor units in a muscle.
Answer: Thousand...
Muscles are typically relaxed and must be _______ to contract.
Muscles are typically relaxed and must be _______ to contract.
Answer: Signale...
A Japanese therapy designed to help clients discover personal guilt for having been ungrateful and troublesome to others and to develop gratitude toward those who have helped them is known as ____.
A Japanese therapy designed to help clients discover personal guilt for having been ungrateful and troublesome to others and to develop gratitude toward...
ECT is used primarily to treat ____.
ECT is used primarily to treat ____.
a. phobias
b. conduct disorders
c. severe depression
d. schizophrenia
Answer: c. schizophren...
In electroconvulsive therapy (ECT), ______.
In electroconvulsive therapy (ECT), ______.
a. current is never applied to the left hemisphere
b. convulsions activate the central and peripheral...
The effectiveness of antipsychotic drugs is thought to result primarily from blockage of ____ receptors.
The effectiveness of antipsychotic drugs is thought to result primarily from blockage of ____ receptors.
a. serotonin
b. dopamine
c. epinephrine
d....
The dramatic reduction in the number of hospitalized patients today compared to past decades is primarily attributable to ____.
The dramatic reduction in the number of hospitalized patients today compared to past decades is primarily attributable to ____.
a. biomedical therapy
b....
In behavior therapy, ____ techniques use shaping and reinforcement to increase adaptive behaviors.
In behavior therapy, ____ techniques use shaping and reinforcement to increase adaptive behaviors.
a. classical conditioning
b. modeling
c. operant...
A group of techniques used to change maladaptive behaviors is known as ____.
A group of techniques used to change maladaptive behaviors is known as ____.
Answer: behavior thera...
____ treats the family as a unit, and members work together to solve problems.
____ treats the family as a unit, and members work together to solve problems.
a. aversion therapy
b. an encounter group
c. a self-help group
d....
In ____, multiple people meet together to work toward therapeutic goals.
In ____, multiple people meet together to work toward therapeutic goals.
Answer: group thera...
Using Beck's four destructive thought patterns associated with depression, label the following thoughts:
Using Beck's four destructive thought patterns associated with depression, label the following thoughts:
a. Mary left me, and I'll never fall in...
Cognitive therapists assume that problem behaviors and emotions are caused by ____.
Cognitive therapists assume that problem behaviors and emotions are caused by ____.
Answer: faulty thought processes and belie...
Subscribe to:
Posts (Atom)