Exam 18: Computer and Network Security Threats

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not an example of intrusion:

(Multiple Choice)
4.9/5
(42)

A masquerader is a legitimate user who accesses data,programs,or resources for which such access is not authorized.

(True/False)
4.8/5
(32)

The three key objectives of computer security are confidentiality,integrity,and availability.

(True/False)
4.8/5
(32)

A worm that can attack a variety of OSs rather than a single OS such as Windows is:

(Multiple Choice)
4.8/5
(42)

Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.

(True/False)
4.7/5
(38)

The network vehicle used for worm propagation is:

(Multiple Choice)
4.9/5
(34)

All parasitic malware is software that replicates.

(True/False)
4.9/5
(28)
Showing 21 - 27 of 27
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)