Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

Question 1 (6.66 points) According to the FBI, espionage agents are mostly Question 1 options: 1) men located outside the U.S. 2) men located within

Question 1 (6.66 points)

According to the FBI, espionage agents are mostly

Question 1 options:

1) men located outside the U.S.
2) men located within the U.S.
3) women located outside the U.S.
4) women located within the U.S.

Question 2 (6.66 points)

The data that makes a database system self-defining is

Question 2 options:

1) metadata.
2) defining data.
3) data structure.
4) data definition language.

Question 3 (6.66 points)

The process of performing authorized queries and deducing unauthorized information from the legitimate responses received is called

Question 3 options:

1) compromise.
2) inference.
3) partitioning.
4) exfiltration.

Question 4 (6.66 points)

Types of intelligence use are

Question 4 options:

1) human, geospatial, and covert.
2) situational, operational, and strategic.
3) current, estimative, and warning.
4) research, scientific, and technical.

Question 5 (6.66 points)

The "small world phenomenon" is the hypothesis that

Question 5 options:

1) air transport greatly reduces the time for long-distance travel.
2) messages move at electronic speed in the 21st century.
3) widely separated people can be linked together with amazingly few links.
4) there is a Disney theme park within 500 miles of every American.

Question 6 (6.66 points)

SQL injection involves

Question 6 options:

1) constructing SQL by point-and-click or query by example.
2) making authorized SQL queries in an attempt to gain access to unauthorized information.
3) supplying SQL where data is expected in an attempt to compromise a database.
4) storing SQL database itself for later execution.

Question 7 (6.66 points)

The danger signs of espionage include

Question 7 options:

1) furtive behavior, odd working hours, and unexplained absences.
2) unexplained absences, substance abuse, and constant curiosity.
3) unexplained affluence, odd working hours, and asymmetric relationships.
4) constant curiosity, furtive behavior, and unexplained absences.

Question 8 (6.66 points)

What the Federal government has called "telephone metadata" consists of

Question 8 options:

1) details of called and calling number, data, time, and possibly cell tower identifiers.
2) stored contents of telephone conversations.
3) cross-reference of telephone numbers to subscriber names.
4) cross reference of subscriber names to telephone numbers.

Question 9 (6.66 points)

A table of rows and columns is the basic building block of a

Question 9 options:

1) query set.
2) relational database.
3) DBMS.
4) tuple.

Question 10 (6.66 points)

According to the FBI, the most frequent motivation for espionage is

Question 10 options:

1) compromise.
2) ideology.
3) money.
4) revenge.

Question 11 (6.66 points)

An attack involving input to a web form of commands that are subsequently executed by a database management system is called a(n)

Question 11 options:

1) SQL injection attack.
2) cross-site scripting attack.
3) command injection attack.
4) form-input attack.

Question 12 (6.66 points)

The ACID property is

Question 12 options:

1) access control of information and data.
2) atomic, consistent, isolated, durable.
3) automatic control of identifying data.
4) able, capable, informed, dependable.

Question 13 (6.66 points)

The best defense against SQL injection is

Question 13 options:

1) avoiding the use of SQL in online applications.
2) good programming practices in general.
3) using parameterized queries.
4) clever naming of database attributes

Question 14 (6.66 points)

An inference attack based on source, destination, and volume of messages is called

Question 14 options:

1) network monitoring.
2) message logging.
3) traffic analysis.
4) traffic monitoring.

Question 15 (6.66 points)

The Italian bank in the case was alerted to a problem because

Question 15 options:

1) they were monitoring outgoing connections.
2) they were monitoring incoming connections.
3) they had phishing detection in their firewall.
4) they were notified by the police.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_step_2

Step: 3

blur-text-image_step3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students explore these related Databases questions

Question

How do Data Types perform data validation?

Answered: 3 weeks ago

Question

How does Referential Integrity work?

Answered: 3 weeks ago