Exam 14: Computer Security Threats
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
A computer _________ is a piece of software that can "infect" other programs by modifying them; the modification includes injecting the original program with a routine to make copies of itself, which can then go on to infect other programs.
Free
(Short Answer)
4.7/5
(41)
Correct Answer:
virus
_________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
B
A _________ is a program that can replicate itself and send copies from computer to computer across network connections.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
D
Hardware is the most vulnerable to attack and the least susceptible to automated controls.
(True/False)
4.8/5
(33)
A __________ is a secret entry point into a program that allows someone who is aware of it to gain access without going through the usual security access procedures.
(Short Answer)
4.9/5
(35)
Three key objectives of computer security are: confidentiality, availability, and _________ .
(Short Answer)
4.9/5
(31)
__________ assures that information and programs are changed only in a specified and authorized manner.
(Short Answer)
4.8/5
(40)
A loss of _________ is the disruption of access to, or use of, information or an information system.
(Multiple Choice)
4.7/5
(29)
_________ can occur either by means of malicious logic or a hacker that has gained unauthorized access to a system.
(Multiple Choice)
4.9/5
(38)
_________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.
(Short Answer)
4.8/5
(39)
A __________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.
(Short Answer)
4.8/5
(36)
Traditionally, those who hack into computers do so for the thrill of it or for status.
(True/False)
4.8/5
(32)
One way to obstruct system operation is to overload the system by placing excess burden on communication traffic or processing resources.
(True/False)
4.8/5
(34)
_________ assures that private or confidential information is not made available or disclosed to unauthorized individuals.
(Multiple Choice)
4.8/5
(35)
Defacing a Web server, running a packet sniffer on a workstation to capture user names and passwords, viewing sensitive data without authorization, and copying a database containing credit card numbers, are all examples of _________ .
(Short Answer)
5.0/5
(32)
An example of _________ is known as traffic analysis, in which an adversary is able to gain information from observing the pattern of traffic on a network.
(Multiple Choice)
4.7/5
(41)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)