Exam 11: Security and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is a strategy that contributes to system recovery.

(Multiple Choice)
4.7/5
(40)

Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

(Multiple Choice)
4.7/5
(35)

Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.

(Multiple Choice)
4.8/5
(34)

When nonsynchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data."

(True/False)
4.8/5
(41)

____ has the highest level of risk.

(Multiple Choice)
4.9/5
(34)

There are several guaranteed methods of protecting your system from assault.

(True/False)
4.9/5
(37)

A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.

(True/False)
4.8/5
(37)

If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.

(True/False)
4.8/5
(38)

A master boot record virus infects both the boot record and program files, making them especially difficult to repair.

(True/False)
4.8/5
(30)

Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.

(True/False)
4.8/5
(37)

Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.

(True/False)
4.8/5
(39)

A logic bomb perform its malicious work ____.

(Multiple Choice)
4.7/5
(40)

A good password is unusual, memorable, and changed often, usually ____.

(Multiple Choice)
4.8/5
(39)

In 1977 the IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community.

(True/False)
4.7/5
(40)

It would take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.

(Multiple Choice)
4.9/5
(29)

A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.

(True/False)
5.0/5
(48)

A firewall sits between the network and the individual computers.

(True/False)
4.8/5
(36)

Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.

(True/False)
4.8/5
(44)

Software to combat viruses is always preventive.

(True/False)
4.7/5
(41)

As an alternative to passwords, some systems have integrated use of a ____.

(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)