Exam 7: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process of determining that a user has permission to perform a particular action on a computer is called

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

An intentional action designed to prevent legitimate users from making use of a computer service is called

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

C

The Conficker worm is notable because

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

A software program that responds to commands sent by a command-and-control program located on an external computer is called a

(Multiple Choice)
4.9/5
(43)

Manipulating someone within an organization to gain access to confidential information is called

(Multiple Choice)
4.9/5
(41)

A program with a benign capability that conceals another, sinister purpose is called a

(Multiple Choice)
4.9/5
(44)

You may find a virus

(Multiple Choice)
4.9/5
(38)

Anonymous is

(Multiple Choice)
4.7/5
(39)

A self-contained program that spreads through a computer network by exploiting security holes is called a

(Multiple Choice)
4.8/5
(31)

The Internet worm was released by

(Multiple Choice)
4.7/5
(37)

Determining that a person is who he or she claims to be on a computer is called

(Multiple Choice)
4.8/5
(31)

A piece of self-replicating code embedded within another program is called a

(Multiple Choice)
4.9/5
(27)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)