Exam 11: Security and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The first widely destructive worm infected more than 6,000 systems over several days in 1988.

(True/False)
4.9/5
(38)

A ____ combines into one program the characteristics of other attacks.

(Multiple Choice)
4.8/5
(34)

A gap in system security is always malicious.

(True/False)
4.9/5
(42)

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

(Multiple Choice)
4.8/5
(32)

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination.

(Multiple Choice)
4.9/5
(41)

Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct.

(Multiple Choice)
4.8/5
(34)

Some viruses are benign.

(True/False)
4.7/5
(44)

The immediate result of a worm is ____.

(Multiple Choice)
4.8/5
(34)

Public/private key encryption relies on the fact that there is no known formula for factoring large numbers greater than ____ digits.

(Multiple Choice)
4.9/5
(29)

Two methods of active wire tapping are "between lines transmission" and "____."

(Multiple Choice)
4.7/5
(37)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)