Filters
Question type

Study Flashcards

A ____ combines into one program the characteristics of other attacks.


A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

____ peruse data packets as they pass by,examine each one for specific information,and log copies of interesting packets for more detailed examination.


A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

The capability of a system to fulfill its mission,in a timely manner,in the presence of attacks,failures,or accidents is known as ____.


A) attack resistance
B) attack survivability
C) system recovery
D) system survivability

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Wiretapping involves the capability of authorized users to search through storage,directories,or files for private information.

A) True
B) False

Correct Answer

verifed

verified

As an alternative to passwords,some systems have integrated use of a ____.


A) smart card
B) fingerprint scanner
C) biometric scanner
D) retina scanner

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.

A) True
B) False

Correct Answer

verifed

verified

The immediate result of a worm is ____.


A) not noticeable until later
B) the slower processing time of legitimate work
C) complete data loss with little chance of recovery
D) a computer crash with or without a blue screen

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

B

Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.

A) True
B) False

Correct Answer

verifed

verified

Trash collection,also known as ____,is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.


A) dumpster diving
B) digital recycling
C) dumpster surfing
D) trash surfing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Using ____,a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address,destination address,and protocol are all correct.


A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

B

A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.

A) True
B) False

Correct Answer

verifed

verified

The object used by the Kerberos protocol to provide client verification is known as a ____.


A) password
B) passphrase
C) token
D) ticket

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Any vulnerability at the operating system level opens the entire system to attack.

A) True
B) False

Correct Answer

verifed

verified

A ____ server hides important network information from outsiders by making the network server invisible.


A) redirection
B) blocking
C) proxy
D) fire

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.


A) Spoofing
B) Phishing
C) Impersonating
D) Acting

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

B

Two methods of active wiretapping are "between lines transmission" and "____."


A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

In public/private key encryption,the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.

A) True
B) False

Correct Answer

verifed

verified

A logic bomb often spreads unnoticed throughout a network until a predetermined event,when it goes off and does its damage.

A) True
B) False

Correct Answer

verifed

verified

One major disadvantage of encryption is that ____.


A) it increases the system's overhead
B) it is inconvenient for users
C) it is prohibitive in cost
D) it is often ineffective

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 40

Related Exams

Show Answer