Exam 15: Computer Security Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder.

(Multiple Choice)
4.7/5
(35)

When a file containing a polymorphic virus is executed, the virus must decrypt itself to activate.

(True/False)
4.7/5
(29)

Traditional DAC systems define the access rights of individual users and groups of users.

(True/False)
4.8/5
(41)

Smart tokens include an embedded __________ .

(Multiple Choice)
4.9/5
(33)

The success of the digital immune system depends on the ability of the virus analysis machine to detect new and innovative virus strains.

(True/False)
4.9/5
(38)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)