Exam 7: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A self-contained program that spreads through a computer network by exploiting security holes is called a

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

E

You may find a virus

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

E

The Internet worm was released by

Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
Verified

D

Vote-counting irregularities in the State of________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.

(Short Answer)
4.8/5
(31)

According to some estimates, 90 percent of spam is distributed through________ networks.

(Short Answer)
4.8/5
(34)

An intentional action designed to prevent legitimate users from making use of a computer service is called a________ .

(Short Answer)
5.0/5
(39)

A program with a benign capability that conceals another, sinister purpose is called a

(Multiple Choice)
4.9/5
(40)

A ________is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.

(Short Answer)
4.8/5
(41)

The manipulation of a person inside an organization to gain access to confidential information is called ________.

(Short Answer)
4.9/5
(35)

A ________is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.

(Short Answer)
4.7/5
(33)

An intentional action designed to prevent legitimate users from making use of a computer service is called

(Multiple Choice)
4.9/5
(30)

A software program that responds to commands sent by a command-and-control program located on an external computer is called a

(Multiple Choice)
4.7/5
(31)

A file accompanying an email message is called an________ .

(Short Answer)
4.9/5
(39)

The________ criminalizes a wide variety of hacker-related activities.

(Short Answer)
4.9/5
(34)

A ________is a piece of self-replicating code embedded within another program called the host.

(Short Answer)
4.9/5
(49)

Manipulating someone within an organization to gain access to confidential information is called

(Multiple Choice)
4.9/5
(41)

The Conficker worm is notable because

(Multiple Choice)
4.9/5
(42)

A piece of self-replicating code embedded within another program is called a

(Multiple Choice)
4.7/5
(33)

Anonymous is

(Multiple Choice)
4.9/5
(44)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)