Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.

Free
(True/False)
5.0/5
(36)
Correct Answer:
Verified

True

Unauthorized use involves using a computer resource for unauthorized activities.

Free
(True/False)
4.8/5
(24)
Correct Answer:
Verified

True

In businesses, access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.

Free
(Short Answer)
4.7/5
(38)
Correct Answer:
Verified

IDM

A(n) denial of service (DoS) attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer.

(True/False)
4.9/5
(33)

Computer spyware includes any illegal act involving a computer.

(True/False)
4.8/5
(30)

Private key encryption is also called symmetric key encryption.

(True/False)
4.9/5
(32)

Identification systems determine whether or not the person attempting access is actually who he or she claims to be.

(True/False)
4.9/5
(41)

A(n) ____________________ is a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender of a document.

(Short Answer)
4.9/5
(33)

What is war driving?

(Essay)
4.7/5
(37)

A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

(Multiple Choice)
4.8/5
(37)

Like a computer virus, a ____ is a malicious program designed to cause damage.

(Multiple Choice)
4.8/5
(41)

Discuss online auction fraud.

(Essay)
4.8/5
(31)

  ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee's computer. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee's computer.

(Multiple Choice)
4.8/5
(42)

AntiDoS software is used to detect and eliminate computer viruses and other types of malware.

(True/False)
4.9/5
(31)

____ uses a single secret key to both encrypt and decrypt the file or message.

(Multiple Choice)
4.8/5
(29)

A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

(Multiple Choice)
4.9/5
(35)

The purpose of a(n) ____________________ is to authenticate the identity of an individual or organization.

(Short Answer)
4.9/5
(32)

Numeric passwords are also referred to passcodes .

(True/False)
4.8/5
(40)

A ____ is a malicious program that masquerades as something else-usually as some type of application program.

(Multiple Choice)
5.0/5
(32)

A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)