Exam 15: Computer Security Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ is not a central element of a typical antivirus scheme.

Free
(Multiple Choice)
5.0/5
(29)
Correct Answer:
Verified

D

__________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

C

One of the best known protection mechanisms is __________ , which is a compiler extension that inserts additional function entry and exit code.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

stackguard

The _________ prevents duplicate passwords from being visible in the password file.

(Multiple Choice)
4.7/5
(34)

A password cracker is a password guessing program.

(True/False)
4.9/5
(33)

A hashed password technique typically combines the password with ___________ .

(Multiple Choice)
4.8/5
(37)

__________ controls access based on comparing security labels with security clearances.

(Multiple Choice)
4.8/5
(32)

Objects that a user possesses for the purpose of user authentication are called _________ .

(Short Answer)
4.8/5
(38)

Authentication protocols used with smart tokens are classified into three categories: static, dynamic password generator, and __________ .

(Short Answer)
4.9/5
(34)

An __________ dictates what types of access are permitted, under what circumstances, and by whom.

(Short Answer)
4.9/5
(35)

The motivation for the development of the __________ has been the rising threat of Internet-based virus propagation.

(Short Answer)
4.8/5
(36)

__________ controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.

(Short Answer)
4.8/5
(35)

In the case of a challenge-response protocol the token generates a unique password periodically.

(True/False)
4.9/5
(42)

_________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

(Short Answer)
4.9/5
(31)

For user authentication to computer, the most important category of smart token is the smart card.

(True/False)
4.9/5
(38)

__________ add a specialized layer of security software to vulnerable or sensitive systems; examples include database servers and administrative systems.

(Short Answer)
4.8/5
(29)

__________ technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.

(Short Answer)
4.8/5
(41)

A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

(Short Answer)
4.8/5
(30)

__________ is based on the roles that users assume in a system rather than the user's identity.

(Multiple Choice)
4.7/5
(37)

_________ controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do.

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)