Exam 11: Security and Ethics
Exam 1: Introducing Operating Systems50 Questions
Exam 2: Memory Management: Early Systems50 Questions
Exam 3: Memory Management: Virtual Memory50 Questions
Exam 4: Processor Management50 Questions
Exam 5: Process Management50 Questions
Exam 6: Concurrent Processes50 Questions
Exam 7: Device Management50 Questions
Exam 8: File Management50 Questions
Exam 9: Network Organization Concepts50 Questions
Exam 10: Management of Network Functions50 Questions
Exam 11: Security and Ethics50 Questions
Exam 12: System Management50 Questions
Exam 13: Unix Operating System50 Questions
Exam 14: Ms-Dos Operating System50 Questions
Exam 15: Windows Operating Systems50 Questions
Exam 16: Linux Operating System50 Questions
Select questions type
Total network encryption is also known as ____.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
Wire tapping is when unauthorized users gain the capability to search through storage, directories, or files for information they aren't privileged to read.
Free
(True/False)
4.9/5
(43)
Correct Answer:
False
The Kerberos protocol does not provide a mechanism for revoking access from users who should no longer have access.
Free
(True/False)
4.7/5
(52)
Correct Answer:
False
A logic bomb often spreads unnoticed throughout a network until it goes off and does its damage.
(True/False)
4.9/5
(33)
The ____ is responsible for monitoring the ethical use of technology.
(Multiple Choice)
4.8/5
(32)
Backups become significant when a computer virus infects your system.
(True/False)
4.7/5
(35)
The only way to remove a Trojan horse is to remove the entire body of the malicious program.
(True/False)
4.8/5
(28)
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.
(Multiple Choice)
5.0/5
(34)
Generally, ____ software to combat viruses compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity.
(Multiple Choice)
4.9/5
(37)
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
(True/False)
4.8/5
(29)
A ____ server hides important network information from outsiders by making the network server invisible.
(Multiple Choice)
4.8/5
(39)
When the entire system is backed up once a week and only the files that were changed that day are backed up daily, this is known as a(n) ____ backup.
(Multiple Choice)
4.8/5
(45)
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there; this is an example of a(n) ____.
(Multiple Choice)
4.9/5
(41)
One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT.
(True/False)
4.9/5
(43)
Any vulnerability at the operating system level opens the entire system to attack.
(True/False)
4.8/5
(48)
The object used by the Kerberos protocol to provide client verification is known as a ____.
(Multiple Choice)
4.8/5
(36)
A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.
(True/False)
4.7/5
(43)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)