Exam 28: Securing Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The scrambling code used to attempt to modify a(n) _______________ virus to prevent detection is actually used as the signature to detect the virus.

(Short Answer)
4.8/5
(35)

Not all __________ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information.

(Short Answer)
4.8/5
(35)

The tool used to set local policies on an individual system is _______________.

(Short Answer)
5.0/5
(34)

Together, what are viruses, Trojans, and worms called?

(Multiple Choice)
4.7/5
(35)

What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?

(Multiple Choice)
4.8/5
(30)

An intrusion prevention system will _______________.

(Multiple Choice)
4.9/5
(40)

Describe a security token and an RSA token.

(Essay)
4.9/5
(37)

What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

(Multiple Choice)
4.9/5
(40)

What is port triggering?

(Essay)
4.8/5
(42)

What is a stealth virus?

(Essay)
4.9/5
(33)

Define effective permissions.

(Essay)
4.9/5
(30)

How is the Guest account a security risk?

(Essay)
4.9/5
(35)

A complete program that travels from machine to machine through computer networks and can cause so much activity that it can overload a network is a(n) _______________.

(Short Answer)
4.7/5
(40)

Surprise browser windows that appear automatically when you visit a Web site are known as _______________.

(Short Answer)
4.8/5
(40)

A common _______________ attack is where an attacker uses the telephone and convinces a user to give up secure information.

(Short Answer)
4.8/5
(40)

In the context of malware, what is remediation?

(Essay)
4.9/5
(29)

Most computer attacks are accomplished through what type of attack?

(Multiple Choice)
4.9/5
(30)

The tool used to apply policy settings to multiple computers in an Active Directory domain is _______________.

(Short Answer)
4.9/5
(39)

What tool allows a computer to determine a user's identity with the most authority?

(Multiple Choice)
4.9/5
(46)

What can be used to set security policies for users or computers in a network?

(Essay)
4.8/5
(26)
Showing 21 - 40 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)