Exam 14: Computer Security Threats

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A _________, also known as a zombie or drone, is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the creator.

(Short Answer)
4.8/5
(42)

A loss of confidentiality is the unauthorized disclosure of information.

(True/False)
4.9/5
(37)

__________ means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.

(Short Answer)
4.8/5
(36)

Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.

(True/False)
4.7/5
(36)

Use Trojan horses to leave backdoors for reentry, use sniffer to capture passwords, act quickly and precisely to make their activities harder to detect, and make few or no mistakes, are all examples of _________ patterns of behavior.

(Multiple Choice)
4.8/5
(35)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)