Exam 18: Computer and Network Security Threats
Exam 1: Introduction25 Questions
Exam 2: Business Information23 Questions
Exam 3: Distributed Data Processing20 Questions
Exam 4: Internet History and Architecture18 Questions
Exam 5: Tcp/ip and Osi15 Questions
Exam 6: Clientserver and Intranet Computing13 Questions
Exam 7: Internet-Based Applications20 Questions
Exam 8: Internet Operation16 Questions
Exam 9: Lan Architecture and Protocols17 Questions
Exam 10: Ethernet and Fibre Channel13 Questions
Exam 11: Wireless Lans15 Questions
Exam 12: Circuit Switching and Packet Switching17 Questions
Exam 13: Frame Relay and Atm24 Questions
Exam 14: Wireless Wans23 Questions
Exam 15: Data Transmission25 Questions
Exam 16: Data Communication Fundamentals23 Questions
Exam 17: Data Link Control and Multiplexing15 Questions
Exam 18: Computer and Network Security Threats27 Questions
Exam 19: Computer and Network Security Techniques18 Questions
Exam 20: Network Management15 Questions
Select questions type
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as:
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
Of the three classes of intruders into computer systems and networks,the clandestine user is typically:
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
Free
(True/False)
4.9/5
(28)
Correct Answer:
False
Most viruses carry out their work in a manner that is specific to a particular operating system.
(True/False)
4.9/5
(33)
A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.
(True/False)
4.9/5
(32)
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of:
(Multiple Choice)
4.9/5
(31)
A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked,performs some unwanted or harmful function.
(True/False)
4.9/5
(38)
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
(True/False)
4.7/5
(37)
The primary mechanism used in implementing denial-of-service attacks is the:
(Multiple Choice)
4.9/5
(33)
Which of the following statements is generally true regarding the original class of email viruses:
(Multiple Choice)
4.8/5
(34)
A macro virus is a larger and more self-contained than an ordinary virus.
(True/False)
4.8/5
(34)
A worm is a program that can replicate itself and send copies from computer to computer across network connections.
(True/False)
4.9/5
(44)
A stealth virus is explicitly designed to hide itself from detection by antivirus software.
(True/False)
4.8/5
(35)
A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:
(Multiple Choice)
4.9/5
(29)
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the:
(Multiple Choice)
4.9/5
(33)
Which of the following statements regarding macro viruses is true:
(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 27
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)