Exam 14: Computer Security Threats

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

(Short Answer)
4.7/5
(41)

_________ assures that systems work promptly and service is not denied to authorized users.

(Multiple Choice)
4.8/5
(35)

Exposure, interception, inference and intrusion can result in this threat consequence:

(Multiple Choice)
4.8/5
(32)

The _________ facility is what distinguishes a bot from a worm.

(Short Answer)
5.0/5
(44)

_________ is when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.

(Multiple Choice)
4.8/5
(42)

A _________ is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.

(Multiple Choice)
4.9/5
(32)

Unauthorized disclosure is a threat to authenticity.

(True/False)
4.8/5
(35)

An active attack attempts to alter system resources or affect their operation.

(True/False)
4.8/5
(30)

_________ is a circumstance or event that results in control of system services or functions by an unauthorized entity.

(Short Answer)
4.7/5
(35)

A loss of _________ is the unauthorized modification or destruction of information.

(Multiple Choice)
4.9/5
(25)

The event or condition that determines when the payload is activated or delivered is the _________ .

(Multiple Choice)
4.9/5
(44)

Masquerade, falsification, and repudiation are attacks resulting in a __________ threat consequence.

(Short Answer)
4.9/5
(36)

A _________ attack attempts to learn or make use of information from the system but does not affect system resources.

(Short Answer)
4.9/5
(36)

Software piracy is an example of a software confidentiality threat.

(True/False)
5.0/5
(40)

The three key concepts that are at the heart of computer security form what is often referred to as the __________ .

(Short Answer)
4.7/5
(46)

A backdoor used by programmers to debug and test programs is called a __________ .

(Multiple Choice)
4.7/5
(46)

A stealth virus is a form of virus where just the payload is hidden.

(True/False)
4.9/5
(37)

Obstruction is when an entity assumes unauthorized logical or physical control of a system resource.

(True/False)
4.9/5
(41)

A rootkit is a set of programs installed on a system to maintain administrator access to that system.

(True/False)
4.9/5
(43)

Repudiation is when an entity deceives another by falsely denying responsibility for an act.

(True/False)
4.8/5
(32)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)