Exam 14: Computer Security Threats
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
(Short Answer)
4.7/5
(41)
_________ assures that systems work promptly and service is not denied to authorized users.
(Multiple Choice)
4.8/5
(35)
Exposure, interception, inference and intrusion can result in this threat consequence:
(Multiple Choice)
4.8/5
(32)
The _________ facility is what distinguishes a bot from a worm.
(Short Answer)
5.0/5
(44)
_________ is when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.
(Multiple Choice)
4.8/5
(42)
A _________ is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.
(Multiple Choice)
4.9/5
(32)
An active attack attempts to alter system resources or affect their operation.
(True/False)
4.8/5
(30)
_________ is a circumstance or event that results in control of system services or functions by an unauthorized entity.
(Short Answer)
4.7/5
(35)
A loss of _________ is the unauthorized modification or destruction of information.
(Multiple Choice)
4.9/5
(25)
The event or condition that determines when the payload is activated or delivered is the _________ .
(Multiple Choice)
4.9/5
(44)
Masquerade, falsification, and repudiation are attacks resulting in a __________ threat consequence.
(Short Answer)
4.9/5
(36)
A _________ attack attempts to learn or make use of information from the system but does not affect system resources.
(Short Answer)
4.9/5
(36)
Software piracy is an example of a software confidentiality threat.
(True/False)
5.0/5
(40)
The three key concepts that are at the heart of computer security form what is often referred to as the __________ .
(Short Answer)
4.7/5
(46)
A backdoor used by programmers to debug and test programs is called a __________ .
(Multiple Choice)
4.7/5
(46)
A stealth virus is a form of virus where just the payload is hidden.
(True/False)
4.9/5
(37)
Obstruction is when an entity assumes unauthorized logical or physical control of a system resource.
(True/False)
4.9/5
(41)
A rootkit is a set of programs installed on a system to maintain administrator access to that system.
(True/False)
4.9/5
(43)
Repudiation is when an entity deceives another by falsely denying responsibility for
an act.
(True/False)
4.8/5
(32)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)