Question 1 (6.66 points)
According to the FBI, espionage agents are mostly
Question 1 options:
| 1) | men located outside the U.S. | |
| 2) | men located within the U.S. | |
| 3) | women located outside the U.S. | |
| 4) | women located within the U.S. | |
Question 2 (6.66 points)
The data that makes a database system self-defining is
Question 2 options:
| |
| |
| |
| 4) | data definition language. | |
Question 3 (6.66 points)
The process of performing authorized queries and deducing unauthorized information from the legitimate responses received is called
Question 3 options:
Question 4 (6.66 points)
Types of intelligence use are
Question 4 options:
| 1) | human, geospatial, and covert. | |
| 2) | situational, operational, and strategic. | |
| 3) | current, estimative, and warning. | |
| 4) | research, scientific, and technical. | |
Question 5 (6.66 points)
The "small world phenomenon" is the hypothesis that
Question 5 options:
| 1) | air transport greatly reduces the time for long-distance travel. | |
| 2) | messages move at electronic speed in the 21st century. | |
| 3) | widely separated people can be linked together with amazingly few links. | |
| 4) | there is a Disney theme park within 500 miles of every American. | |
Question 6 (6.66 points)
SQL injection involves
Question 6 options:
| 1) | constructing SQL by point-and-click or query by example. | |
| 2) | making authorized SQL queries in an attempt to gain access to unauthorized information. | |
| 3) | supplying SQL where data is expected in an attempt to compromise a database. | |
| 4) | storing SQL database itself for later execution. | |
Question 7 (6.66 points)
The danger signs of espionage include
Question 7 options:
| 1) | furtive behavior, odd working hours, and unexplained absences. | |
| 2) | unexplained absences, substance abuse, and constant curiosity. | |
| 3) | unexplained affluence, odd working hours, and asymmetric relationships. | |
| 4) | constant curiosity, furtive behavior, and unexplained absences. | |
Question 8 (6.66 points)
What the Federal government has called "telephone metadata" consists of
Question 8 options:
| 1) | details of called and calling number, data, time, and possibly cell tower identifiers. | |
| 2) | stored contents of telephone conversations. | |
| 3) | cross-reference of telephone numbers to subscriber names. | |
| 4) | cross reference of subscriber names to telephone numbers. | |
Question 9 (6.66 points)
A table of rows and columns is the basic building block of a
Question 9 options:
Question 10 (6.66 points)
According to the FBI, the most frequent motivation for espionage is
Question 10 options:
Question 11 (6.66 points)
An attack involving input to a web form of commands that are subsequently executed by a database management system is called a(n)
Question 11 options:
| |
| 2) | cross-site scripting attack. | |
| 3) | command injection attack. | |
| |
Question 12 (6.66 points)
The ACID property is
Question 12 options:
| 1) | access control of information and data. | |
| 2) | atomic, consistent, isolated, durable. | |
| 3) | automatic control of identifying data. | |
| 4) | able, capable, informed, dependable. | |
Question 13 (6.66 points)
The best defense against SQL injection is
Question 13 options:
| 1) | avoiding the use of SQL in online applications. | |
| 2) | good programming practices in general. | |
| 3) | using parameterized queries. | |
| 4) | clever naming of database attributes | |
Question 14 (6.66 points)
An inference attack based on source, destination, and volume of messages is called
Question 14 options:
Question 15 (6.66 points)
The Italian bank in the case was alerted to a problem because
Question 15 options:
| 1) | they were monitoring outgoing connections. | |
| 2) | they were monitoring incoming connections. | |
| 3) | they had phishing detection in their firewall. | |
| 4) | they were notified by the police. | |