Filters
Question type

Study Flashcards

A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.

A) True
B) False

Correct Answer

verifed

verified

True

A macro virus infects data files,such as word processing documents and spread sheets,though newer versions now infect other program files as well.

A) True
B) False

Correct Answer

verifed

verified

The immediate result of a worm is ____.


A) not noticeable until later
B) the slower processing time of legitimate work
C) complete data loss with little chance of recovery
D) a computer crash with or without a blue screen

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

B

____ viruses infect data files.


A) File infector
B) Boot sector
C) Master boot record
D) Macro

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.

A) True
B) False

Correct Answer

verifed

verified

Two methods of active wiretapping are "between lines transmission" and "____."


A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.

A) True
B) False

Correct Answer

verifed

verified

A virus is defined as a small program written to alter the way a computer operates,without the permission or knowledge of the user.

A) True
B) False

Correct Answer

verifed

verified

Some viruses are considered to be benign.

A) True
B) False

Correct Answer

verifed

verified

False

____ involve the use of graphics and a pattern of clicks using a touch screen,mouse,or other pointing device.


A) Picture passwords
B) fingerprint scanner
C) biometric scanner
D) retina scanner

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.


A) worm
B) masquerade program
C) Trojan horse
D) virtual login console

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Any vulnerability at the operating system level opens the entire system to attack.

A) True
B) False

Correct Answer

verifed

verified

A master boot record virus infects both the boot record and program files,making them especially difficult to repair.

A) True
B) False

Correct Answer

verifed

verified

The capability of a system to fulfill its mission,in a timely manner,in the presence of attacks,failures,or accidents is known as ____.


A) attack resistance
B) attack survivability
C) system recovery
D) system survivability

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

If a password consists of ten characters,it would take a human about 4.5 years to guess the password if the human makes one try each second.

A) True
B) False

Correct Answer

verifed

verified

A ____ server hides important network information from outsiders by making the network server invisible.


A) redirection
B) blocking
C) proxy
D) fire

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.

A) True
B) False

Correct Answer

verifed

verified

One popular authentication tool is Kerberos,a network authentication protocol developed as part of the Athena Project at MIT.

A) True
B) False

Correct Answer

verifed

verified

When nonsynchronized processes access data records and modify some but not all of a record's fields,it is called "accidental incomplete modification of data."

A) True
B) False

Correct Answer

verifed

verified

A firewall typically sits between a network and its individual computers.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 40

Related Exams

Show Answer