Exam 2: The Need for Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ is an application error that occurs when more data is sent to a program than it is designed to handle.

(Short Answer)
4.9/5
(32)

A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.

(Short Answer)
4.8/5
(30)

With the removal of copyright protection mechanisms, software can be easily distributed and installed.

(True/False)
4.8/5
(40)

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

(True/False)
4.8/5
(43)

A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files-such as word-processing documents-and sensitive data transmitted to or from applications.

(True/False)
4.8/5
(29)

DoS attacks cannot be launched against routers.

(True/False)
4.9/5
(36)

When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.

(Short Answer)
4.9/5
(37)

Which of the following is an example of a Trojan horse program  

(Multiple Choice)
4.7/5
(36)

ESD is the acronym for ____________________ discharge.

(Short Answer)
4.7/5
(46)

Duplication of software-based intellectual property is more commonly known as software ____________________.

(Short Answer)
4.7/5
(34)

A(n) ____________________ is an act against an asset that could result in a loss.

(Short Answer)
4.8/5
(43)
Showing 81 - 91 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)