Exam 15: Computer Security Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An effective IDS can serve as a deterrent, thus acting to prevent intrusions.

(True/False)
4.8/5
(42)

The key ingredients of an access matrix are __________ , objects, and access rights.

(Short Answer)
5.0/5
(35)

An antiworm approach that blocks outgoing traffic when a threshold is exceeded is referred to as _________ .

(Multiple Choice)
4.7/5
(37)

The two broad categories of approaches to dealing with buffer overflow attacks are run-time defenses and __________ .

(Short Answer)
4.9/5
(39)

_________ define the type and contents of a security descriptor.

(Short Answer)
5.0/5
(41)

Once a worm is resident on a machine, antivirus software cannot be used to detect it.

(True/False)
4.9/5
(39)

Anomaly approaches attempt to define proper behavior.

(True/False)
4.8/5
(41)

Passwords serve to authenticate the ID of the individual logging on to the system.

(True/False)
4.8/5
(37)

A user only needs a password in order to log on to a UNIX system.

(True/False)
4.7/5
(40)

With a _________ protocol, the user authenticates himself or herself to the token and then the token authenticates the user to the computer.

(Multiple Choice)
4.9/5
(38)

DAC is a concept that evolved out of requirements for military information security.

(True/False)
4.9/5
(32)

__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.

(Multiple Choice)
4.8/5
(40)

Rootkits are easy to detect and neutralize.

(True/False)
4.8/5
(49)

The primary purpose of a(n) _________ is to detect intrusions, log suspicious events, and send alerts.

(Multiple Choice)
4.9/5
(41)

The two types of audit records that may be used in an IDS are detection specific audit records and _________ .

(Short Answer)
4.9/5
(31)

Memory cards can store and process data.

(True/False)
4.8/5
(29)

The __________ determines whether the user is authorized to gain access to a system and the privileges accorded to the user.

(Multiple Choice)
4.8/5
(41)

Virtually all multiuser systems, network-based servers, Web-based e-commerce sites, and other similar services require that a user provide not only a name or identifier (ID) but also a _________ .

(Short Answer)
4.9/5
(44)

An important feature of Windows security is that applications can make use of the Windows security framework for user-defined objects.

(True/False)
4.8/5
(43)

__________ is based on pattern recognition.

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)