Exam 18: Computer and Network Security Threats

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Traffic analysis is an active attack.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

The stage of a virus where it is activated to perform the function for which it was intended is referred to as the _________.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

___________ refers to programs (e.g.,script,macro,or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

Free
(Short Answer)
4.7/5
(34)
Correct Answer:
Verified

Mobile code

Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.

(True/False)
4.9/5
(34)

__________ is preserving authorized restrictions on information access and disclosure,including means for protecting personal privacy and proprietary information.

(Short Answer)
4.7/5
(39)

__________ capture keystrokes on a compromised system.

(Multiple Choice)
4.9/5
(40)

All parasitic malware is software that replicates.

(True/False)
4.8/5
(39)

The three concepts that form the CIA triad are: confidentiality,integrity,and ____________.

(Short Answer)
4.7/5
(34)

A backdoor is the same as a trapdoor.

(True/False)
4.8/5
(33)

Security threats can be classified based on how a given attack provides a threat to a given objective.

(True/False)
4.9/5
(40)

An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.

(True/False)
4.7/5
(29)

A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.

(True/False)
4.9/5
(35)

A worm is a program that can replicate itself and send copies from computer to computer across network connections.

(True/False)
4.7/5
(35)

Important objectives of computer security include:

(Multiple Choice)
4.9/5
(35)

A ___________ is a form of virus explicitly designed to hide itself from detection by antivirus software.

(Short Answer)
4.8/5
(32)

A _________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.

(Short Answer)
4.7/5
(40)

A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked, performs some unwanted or harmful function.

(True/False)
4.8/5
(34)

Of the three classes of intruders into computer systems and networks,the clandestine user is typically:

(Multiple Choice)
4.8/5
(31)

A macro virus is a larger and more self-contained than an ordinary virus.

(True/False)
4.8/5
(38)

Most viruses carry out their work in a manner that is specific to a particular operating system.

(True/False)
4.9/5
(34)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)