Exam 18: Computer and Network Security Threats
Exam 1: Introduction45 Questions
Exam 2: Business Information44 Questions
Exam 3: Distributed Data Processing45 Questions
Exam 4: Data Transmission45 Questions
Exam 5: Data Communication Fundamentals45 Questions
Exam 6: Data Link Control and Multiplexing45 Questions
Exam 7: The Internet45 Questions
Exam 8: Tcp / Ip45 Questions
Exam 9: Client Server, intranet, and Cloud Computing45 Questions
Exam 10: Internet-Based Applications45 Questions
Exam 11: Internet Operation45 Questions
Exam 12: Lan Architecture and Infrastructure45 Questions
Exam 13: Ethernet, switches, and Virtual Lans45 Questions
Exam 14: Wireless Lans45 Questions
Exam 15: Wan Technology and Protocol45 Questions
Exam 16: Wan Services45 Questions
Exam 17: Wireless Lans45 Questions
Exam 18: Computer and Network Security Threats45 Questions
Exam 19: Computer and Network Security Techniques45 Questions
Select questions type
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as ___________.
(Multiple Choice)
4.9/5
(30)
The network vehicle used for worm propagation is ___________.
(Multiple Choice)
4.8/5
(42)
The three key objectives of computer security are confidentiality, integrity,and availability.
(True/False)
4.9/5
(45)
The primary mechanism used in implementing denial-of-service attacks is the:
(Multiple Choice)
4.8/5
(29)
An example of __________ is an adversary gaining unauthorized access to sensitive data by overcoming the system's access control protections.
(Short Answer)
4.8/5
(34)
Which of the following statements regarding macro viruses is true?
(Multiple Choice)
4.8/5
(35)
Which of the following statements is generally true regarding the original class of email viruses?
(Multiple Choice)
4.8/5
(36)
Also known as a zombie or drone,a __________ is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the creator.
(Short Answer)
4.9/5
(34)
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
(True/False)
4.9/5
(45)
An example of _________ is traffic analysis,in which an adversary is able to gain information from observing the pattern of traffic on a network, such as the amount of traffic between particular pairs of hosts on the network.
(Short Answer)
4.9/5
(33)
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.
(Multiple Choice)
5.0/5
(32)
A loss of __________ is the disruption of access to or use of information or an information system.
(Short Answer)
4.8/5
(41)
__________ involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: replay, masquerade,modification of messages,and denial of service.
(Short Answer)
4.7/5
(40)
A _________ propagates itself and activates itself,whereas a bot is controlled from some central facility,at least initially.
(Short Answer)
4.8/5
(36)
A stealth virus is explicitly designed to hide itself from detection by antivirus software.
(True/False)
4.8/5
(34)
__________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability,and confidentiality of information system resources.
(Short Answer)
4.9/5
(34)
A masquerader is a legitimate user who accesses data,programs,or resources for which such access is not authorized.
(True/False)
4.8/5
(35)
_________ are in the nature of eavesdropping on,or monitoring of, transmissions.The goal of the attacker is to obtain information that is being transmitted.
(Short Answer)
4.7/5
(30)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)