Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ virus is usually stored on some form of removable media.When the removable media (such as a flash drive)is connected to a new machine and is used to boot the machine,the virus moves from the media into the host system.

(Multiple Choice)
4.8/5
(34)

The first security protocol for wireless LANs was ____.

(Multiple Choice)
4.9/5
(33)

____ scanning works by recognizing the unique pattern of a virus.

(Multiple Choice)
4.9/5
(31)

A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.

(True/False)
4.9/5
(33)

A(n)____ is the computer program that converts plaintext into an enciphered form.

(Multiple Choice)
4.8/5
(35)

One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.

(Multiple Choice)
4.9/5
(41)

Top-level executives often have access to a narrow range of information within a company.

(True/False)
4.8/5
(42)

____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.

(Multiple Choice)
4.9/5
(38)

When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password,the type of attack is termed ____________________.

(Short Answer)
4.9/5
(35)

A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.

(Multiple Choice)
4.8/5
(33)

A computer ____________________ is a program that copies itself from one system to another over a network,without the assistance of a human being.

(Short Answer)
4.9/5
(38)

The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.

(True/False)
4.8/5
(40)

A digital certificate,or simply a(n)____________________,is an electronic document,similar to a passport,that establishes your credentials when you are performing transactions on the World Wide Web.

(Short Answer)
4.8/5
(33)

The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.

(True/False)
4.9/5
(23)

The idea behind ____________________ spread spectrum transmission is to bounce the signal around on random frequencies rather than transmit it on one fixed frequency.

(Short Answer)
4.9/5
(31)

One of the most common ways to control access to a system is to require user IDs and passwords.

(True/False)
4.8/5
(32)

What are some of the standard rules for creating or changing a password?

(Essay)
4.8/5
(38)

How does public key cryptography work?

(Essay)
4.7/5
(38)

A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.

(Short Answer)
4.9/5
(29)

____ cable represented a major improvement in the ability of transmission media to secure sensitive data.

(Multiple Choice)
4.7/5
(48)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)