Exam 18: Computer and Network Security Threats
Exam 1: Introduction45 Questions
Exam 2: Business Information44 Questions
Exam 3: Distributed Data Processing45 Questions
Exam 4: Data Transmission45 Questions
Exam 5: Data Communication Fundamentals45 Questions
Exam 6: Data Link Control and Multiplexing45 Questions
Exam 7: The Internet45 Questions
Exam 8: Tcp / Ip45 Questions
Exam 9: Client Server, intranet, and Cloud Computing45 Questions
Exam 10: Internet-Based Applications45 Questions
Exam 11: Internet Operation45 Questions
Exam 12: Lan Architecture and Infrastructure45 Questions
Exam 13: Ethernet, switches, and Virtual Lans45 Questions
Exam 14: Wireless Lans45 Questions
Exam 15: Wan Technology and Protocol45 Questions
Exam 16: Wan Services45 Questions
Exam 17: Wireless Lans45 Questions
Exam 18: Computer and Network Security Threats45 Questions
Exam 19: Computer and Network Security Techniques45 Questions
Select questions type
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the _________.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
___________ refers to programs (e.g.,script,macro,or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
Free
(Short Answer)
4.7/5
(34)
Correct Answer:
Mobile code
Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.
(True/False)
4.9/5
(34)
__________ is preserving authorized restrictions on information access and disclosure,including means for protecting personal privacy and proprietary information.
(Short Answer)
4.7/5
(39)
The three concepts that form the CIA triad are: confidentiality,integrity,and ____________.
(Short Answer)
4.7/5
(34)
Security threats can be classified based on how a given attack provides a threat to a given objective.
(True/False)
4.9/5
(40)
An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
(True/False)
4.7/5
(29)
A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.
(True/False)
4.9/5
(35)
A worm is a program that can replicate itself and send copies from computer to computer across network connections.
(True/False)
4.7/5
(35)
A ___________ is a form of virus explicitly designed to hide itself from detection by antivirus software.
(Short Answer)
4.8/5
(32)
A _________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.
(Short Answer)
4.7/5
(40)
A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked, performs some unwanted or harmful function.
(True/False)
4.8/5
(34)
Of the three classes of intruders into computer systems and networks,the clandestine user is typically:
(Multiple Choice)
4.8/5
(31)
A macro virus is a larger and more self-contained than an ordinary virus.
(True/False)
4.8/5
(38)
Most viruses carry out their work in a manner that is specific to a particular operating system.
(True/False)
4.9/5
(34)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)