Exam 11: Security and Ethics
Exam 1: Introducing Operating Systems50 Questions
Exam 2: Memory Management: Early Systems50 Questions
Exam 3: Memory Management: Virtual Memory50 Questions
Exam 4: Processor Management50 Questions
Exam 5: Process Management50 Questions
Exam 6: Concurrent Processes50 Questions
Exam 7: Device Management50 Questions
Exam 8: File Management50 Questions
Exam 9: Network Organization Concepts50 Questions
Exam 10: Management of Network Functions50 Questions
Exam 11: Security and Ethics50 Questions
Exam 12: System Management50 Questions
Exam 13: Unix Operating System50 Questions
Exam 14: Ms-Dos Operating System50 Questions
Exam 15: Windows Operating Systems50 Questions
Exam 16: Linux Operating System50 Questions
Select questions type
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.
(Multiple Choice)
4.7/5
(35)
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.
(Multiple Choice)
4.8/5
(34)
When nonsynchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data."
(True/False)
4.8/5
(41)
There are several guaranteed methods of protecting your system from assault.
(True/False)
4.9/5
(37)
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.
(True/False)
4.8/5
(37)
If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.
(True/False)
4.8/5
(38)
A master boot record virus infects both the boot record and program files, making them especially difficult to repair.
(True/False)
4.8/5
(30)
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.
(True/False)
4.8/5
(37)
Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
(True/False)
4.8/5
(39)
A good password is unusual, memorable, and changed often, usually ____.
(Multiple Choice)
4.8/5
(39)
In 1977 the IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community.
(True/False)
4.7/5
(40)
It would take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.
(Multiple Choice)
4.9/5
(29)
A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.
(True/False)
5.0/5
(48)
A firewall sits between the network and the individual computers.
(True/False)
4.8/5
(36)
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.
(True/False)
4.8/5
(44)
As an alternative to passwords, some systems have integrated use of a ____.
(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)