Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.

(Multiple Choice)
4.8/5
(25)

Universal malware requires a vulnerability to succeed.

(True/False)
5.0/5
(38)

Scripts are likely to be dangerous only if a computer has a vulnerability.

(True/False)
4.8/5
(34)

An attack in which an authentic-looking e-mail or website entices a user to enter his or her username,password,or other sensitive information is called ________.(Select the most specific answer.)

(Multiple Choice)
4.9/5
(39)

A specific encryption method is called a ________.

(Multiple Choice)
4.9/5
(37)

Oversight helps ensure that a policy is implemented faithfully.

(True/False)
4.8/5
(35)

Which of the following specifies what should be done?

(Multiple Choice)
4.9/5
(36)

Authentication should be ________.

(Multiple Choice)
5.0/5
(33)

Policies are separated by implementation to take advantage of ________.

(Multiple Choice)
4.8/5
(42)

Methods that hackers use to break into computers are ________.

(Multiple Choice)
4.8/5
(42)

In identity theft,the attacker steals credit card numbers,which he or she will use to make unauthorized purchases.

(True/False)
4.8/5
(30)

Which of the following is not one of the four response phases for when attacks occur?

(Multiple Choice)
4.9/5
(42)

Trojan horses get onto computers by ________.

(Multiple Choice)
4.9/5
(36)

What are the most dangerous types of employees?

(Multiple Choice)
4.9/5
(38)

The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

(Multiple Choice)
4.9/5
(42)

Which type of attack is made by national governments?

(Multiple Choice)
4.9/5
(39)

A program that can capture passwords as you type them is ________.

(Multiple Choice)
4.8/5
(36)

Security is primarily a ________ issue.

(Multiple Choice)
4.7/5
(38)

Which of the following attach themselves to other programs?

(Multiple Choice)
4.9/5
(37)

An action that will stop many viruses is ________.

(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 124
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)