Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
One form of online vandalism is ________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ________ characters in Internet Explorer 4.0, the browser will crash.
______ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.
A) infoterrorism
B) cyberterrorism
C) hacking
D) cracking
A sniffer program can reveal data transmitted on a network segment including passwords, the embedded and attached files—such as word-processing documents—and sensitive data transmitted to or from applications.
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle
Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.
A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
A race condition is a failure of a program that occurs when an unexpected ordering of events in execution of the program results in a conflict over access to the same system resource.
A) developers fail to properly validate user inputbefore using it to query a relational database.
B) there is a failure to handle errors
C) a user input is passed dirrectly to a compiler or interpreter
D) an application running on a web server gathers data from a user in order to steal it
Why does polymorphism cause greater concern than traditional malware? Choose the best possible answer.
A) Because it installs back door cmponent in systems.
B) Because it overloads the network as much time and energy is wasted forwarding it.
C) Beacause it is undetectable by techniques that look for preconfigured signatures.
D) Because they cause availability disruption.
Why do employees constitute one of the greatest threats to information security? Choose the best answer.
A) Because of incorrect assumptions
B) Because they are the threat agents closest to the organizational data.
C) Because they are inexperience
D) Because they are not properly trained
Each of the following is a techniques used in Social Engineering except _____.
A) perpetrator pose as a person higher in the organizational hierarchy than the victim.
B) Man-in-the-middle
C) Advanced -Fee Fraud (AFF or 4-1-9)
D) Phishing
A) Deliberate sabotage of a computer system or business
B) Technical hardware failures or errors
C) When an attacker or trusted insider steals informationfrom a computer system and demands compensation for its return.
D) Act performed without intent or malicious purposeby an authorized user.
Information Security is a management problem for which of the following reasons?
A) It has to do more with policy and its enforcement than with the technology of its implementation.
B) It has to do only with the technology of its implemention.
C) It is perceived to be a technically complex task.
D) It is not addressed in term of business impact.
Each of the following is an important function performed by the Information Security except ______________.
A) safeguarding the organization's technology assets
B) enabling the safe operation of applications running on the organization's IT systems
C) protecting the organization's ability to function
D) maintaining organizations out of business
It's almost Valentines Day, and Skyler doesn't have enough money to buy the box of candy he had wanted for his girlfriend, Claudette. Skyler is lucky, though, because Claudette is one of those girls who truly believes that it's the thought that counts. He decides that instead of candy, he will use his computer and some graphics applications to make her a special card.Skyler wants the front of the card to have a dramatic, three-dimensional effect. Which of the following layer styles should he use?
A) Depth Emboss
B) Hard Emboss
C) Chisel Hard Emboss
D) Hard Chisel Depth Emboss
When pasting a selection from Illustrator, if you click the ____ option button, the result of the paste is a bitmap graphic, which is pasted as a new layer.
A) Path
B) Pixels
C) Shape Layer
D) Preserve Paths
For some reason, a photo of a Great Northern caboose ended up looking dark purple instead of bright red. He wants to change the color, but he wants the photo to look realistic. What will he need to manipulate in order to make the change?
This month's issue of Choo-Choo: A Magazine for Model Train Enthusiasts was difficult to put together, and it was all because of the photography. It could have been the lighting, the lenses, the camera, or any combination of all three, but the color in every photo was wrong. George, the editor, spent much of the month trying to fix the colors using Photoshop.Which of the following adjustments will George work with in order to alter the hue of the pixels he selected in the cover photograph?
A) Saturation/Color
B) Hue/Saturation
C) Color/Hue
D) Shade/Hue
While employees were excited to jump right into color adjustment when they got to the guided practice part of Olaf's training, he cautioned them that before considering overall color balance, you should first evaluate the ____ of the image.
A) file size
B) color channels
C) tonal range
D) curves
Olaf "Snorri" Torgerson is training new recruits in the color department of an ad agency. Because of the importance of Photoshop in color adjustment, Olaf decides to spend an entire day going over the application's capabilities in that area.Many of the new employees are straight out of college, and Olaf knows that while they may understand the basics of Photoshop, only ____ will help them to truly master the use of curves in color adjustment.
A) time
B) experience
C) practice
D) All of the above
Hans needs to create a special texture for the Roman numerals in order to replicate the German-Style Round clock face template. He must add noise to the type he has already created. Which of the following will allow him to add noise?
A) Click Filter on the Image bar, click Noise, then click Add Noise
B) Click the Image menu, click Duplicate, then type Noise in the As text box
C) Click the Filter menu, point to Noise, the click Add Noise
D) Click the Image menu, click Add Noise, the click OK
Hans has taken over the family clock-making business, and wants to change a few things in order to increase productivity. In order to duplicate the company's signature clock faces accurately, Hans will need to become quite familiar with PS's abilities to change the appearance of type face on a document.Many of the clock faces use stately Roman numerals to represent the hours. Which of the following might Hans use in replicating them in his new PS documents?
A) Roman type
B) chiseled type
C) plastic type
D) recessed type
A) Edit, Transform Path, then Rotate 180
B) Image, Transform Path, then Rotate 180
C) Layer, Transform Path, then Rotate 180
D) Select, Transform Path, then Rotate 180
A risk is the likelihood of a threat source taking advantage of a vulnerability to an information system. Risks left over after implementing safeguards is known as:
A. Leftover risks.
B. Residual risks.
C. Remaining risks.
D. Exposures.
Molly wants Trandow's photo to appear slightly in front of the choir, but when she layers the images, the result looks very flat. In order to create depth and dimension, Molly needs to create a _____ between the two images.
A) line of sight
B) spatial relationship
C) direct correlation
D) image space
The lead singer of the band, Max Power, has always been the focus of Big Soup. Chaz decides that he wants to add color to Max's image in the photo negative. What should he use?
A) Color fill
B) Brush fill
C) Cover mask
D) Fill mask
Art Woofer, the head of the graphic arts department for EarDrum Records contacted Chaz and told him that the company's most popular act, Big Soup, was about to release a new album and that he wanted Chaz to create some cover art for the project. Woofer sent Chaz a trial copy of the album, some promotional photos of the band, and a list of ideas the art department had been tossing around.
The title of the new album is Negativity Scene. Chaz wants to make the photo of the band look like a photo negative. Which of the following effects should he use to achieve the effect he wants?
When creating a ripped effect, you would use a _____ Blur in the Smart Sharpen dialog box if you want to sharpen the fine detail in the grains of paper in the ripped edge.
Nadia is a model who recently turned 35. For her most recent shoot, an ad for a calcium supplement for women, Adrian Wapcaplett, will retouch the image to fix some flaws.
Adrian decides to start with Nadia's eyes because, as with most photographs, the eyelids and lashes cast shadows which made the whites appear _____ .
A) too white
B) bluish gray
C) darker than the iris
D) inorganic
Answer: B
Adrian, being a professional, knows that the Overlay blending mode can be used for all of the following except?
A) Retouching
B) Producing special effects
C) Enhancing an image
D) Creating a mask
___ is one of the most practical and powerful of the blending modes, one you use for retouching, for enhancing an image, and for producing special effects.
Emily works in the advertising department of the local newspaper as a layout artist. John's IPA is the main grocery store in town, and his ad takes the entire back page of the paper. Unfortunately, John does not understand computers at all, and Emily faces various production challenges every week while trying to get his ad finished before deadline
Every week, John sends Emily at least one image that needs to be resized. Bananas are on special this week, and John has sent a very small graphic of a bunch of bananas which he would like to fit in a large hole at the center of the ad. What will likely happen to the image if Emily increases the size to sucg a large degree?
A) The image cannot be resized to fit such a large space.
B) As the pixels increase in size, the image will become sharper.
C) Resizing the image will affect the image quality.
D) The image will lose pixels.
Answer: C
Emily has tried, week after week, to tell John that _____ is a term that refers to the number of pixels per inch in a digital image.
When using the ____ blending mode, pixels retain their color, but they become completely transparent and therefore blend with the pixels of images behind them.
In Windows, when any selection is loaded, pressing and holding ____, and then clicking the Add layer mask button creates a layer mask in which the selected pixels are filled with black.