Exam 15: Computer Security Techniques
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
_________ is not a central element of a typical antivirus scheme.
Free
(Multiple Choice)
5.0/5
(29)
Correct Answer:
D
__________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
C
One of the best known protection mechanisms is __________ , which is a compiler extension that inserts additional function entry and exit code.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
stackguard
The _________ prevents duplicate passwords from being visible in the password file.
(Multiple Choice)
4.7/5
(34)
A hashed password technique typically combines the password with ___________ .
(Multiple Choice)
4.8/5
(37)
__________ controls access based on comparing security labels with security clearances.
(Multiple Choice)
4.8/5
(32)
Objects that a user possesses for the purpose of user authentication are called _________ .
(Short Answer)
4.8/5
(38)
Authentication protocols used with smart tokens are classified into three categories: static, dynamic password generator, and __________ .
(Short Answer)
4.9/5
(34)
An __________ dictates what types of access are permitted, under what circumstances, and by whom.
(Short Answer)
4.9/5
(35)
The motivation for the development of the __________ has been the rising threat of Internet-based virus propagation.
(Short Answer)
4.8/5
(36)
__________ controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
(Short Answer)
4.8/5
(35)
In the case of a challenge-response protocol the token generates a unique password periodically.
(True/False)
4.9/5
(42)
_________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
(Short Answer)
4.9/5
(31)
For user authentication to computer, the most important category of smart token is the smart card.
(True/False)
4.9/5
(38)
__________ add a specialized layer of security software to vulnerable or sensitive systems; examples include database servers and administrative systems.
(Short Answer)
4.8/5
(29)
__________ technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
(Short Answer)
4.8/5
(41)
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
(Short Answer)
4.8/5
(30)
__________ is based on the roles that users assume in a system rather than the user's identity.
(Multiple Choice)
4.7/5
(37)
_________ controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do.
(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)