Exam 11: Security and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Total network encryption is also known as ____.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

Wire tapping is when unauthorized users gain the capability to search through storage, directories, or files for information they aren't privileged to read.

Free
(True/False)
4.9/5
(43)
Correct Answer:
Verified

False

The Kerberos protocol does not provide a mechanism for revoking access from users who should no longer have access.

Free
(True/False)
4.7/5
(52)
Correct Answer:
Verified

False

A logic bomb often spreads unnoticed throughout a network until it goes off and does its damage.

(True/False)
4.9/5
(33)

The ____ is responsible for monitoring the ethical use of technology.

(Multiple Choice)
4.8/5
(32)

A disadvantage of encryption is ____.

(Multiple Choice)
4.8/5
(36)

Backups become significant when a computer virus infects your system.

(True/False)
4.7/5
(35)

The only way to remove a Trojan horse is to remove the entire body of the malicious program.

(True/False)
4.8/5
(28)

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.

(Multiple Choice)
5.0/5
(34)

Generally, ____ software to combat viruses compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity.

(Multiple Choice)
4.9/5
(37)

In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.

(True/False)
4.8/5
(29)

A ____ server hides important network information from outsiders by making the network server invisible.

(Multiple Choice)
4.8/5
(39)

When the entire system is backed up once a week and only the files that were changed that day are backed up daily, this is known as a(n) ____ backup.

(Multiple Choice)
4.8/5
(45)

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there; this is an example of a(n) ____.

(Multiple Choice)
4.9/5
(41)

One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT.

(True/False)
4.9/5
(43)

The most extreme form of encryption is partial encryption.

(True/False)
4.9/5
(43)

____ viruses infect data files.

(Multiple Choice)
4.7/5
(30)

Any vulnerability at the operating system level opens the entire system to attack.

(True/False)
4.8/5
(48)

The object used by the Kerberos protocol to provide client verification is known as a ____.

(Multiple Choice)
4.8/5
(36)

A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.

(True/False)
4.7/5
(43)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)