Exam 18: Computer and Network Security Threats

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as:

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

Of the three classes of intruders into computer systems and networks,the clandestine user is typically:

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.

Free
(True/False)
4.9/5
(28)
Correct Answer:
Verified

False

Traffic analysis is an active attack.

(True/False)
4.8/5
(36)

Most viruses carry out their work in a manner that is specific to a particular operating system.

(True/False)
4.9/5
(33)

A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.

(True/False)
4.9/5
(32)

The type of attack on communications lines and networks known as traffic analysis belongs to the general category of:

(Multiple Choice)
4.9/5
(31)

A backdoor is the same as a trapdoor.

(True/False)
4.8/5
(43)

A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked,performs some unwanted or harmful function.

(True/False)
4.9/5
(38)

Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.

(True/False)
4.7/5
(37)

The primary mechanism used in implementing denial-of-service attacks is the:

(Multiple Choice)
4.9/5
(33)

Which of the following statements is generally true regarding the original class of email viruses:

(Multiple Choice)
4.8/5
(34)

A virus can be attached to a program by:

(Multiple Choice)
4.8/5
(36)

A macro virus is a larger and more self-contained than an ordinary virus.

(True/False)
4.8/5
(34)

A worm is a program that can replicate itself and send copies from computer to computer across network connections.

(True/False)
4.9/5
(44)

Important objectives of computer security include:

(Multiple Choice)
4.7/5
(35)

A stealth virus is explicitly designed to hide itself from detection by antivirus software.

(True/False)
4.8/5
(35)

A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

(Multiple Choice)
4.9/5
(29)

The stage of a virus where it is activated to perform the function for which it was intended is referred to as the:

(Multiple Choice)
4.9/5
(33)

Which of the following statements regarding macro viruses is true:

(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 27
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)