Exam 7: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The Conficker worm is notable because

Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
Verified

D

Determining that a person is who he or she claims to be on a computer is called

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

B

A is a piece of self-replicating code embedded within another program called the host.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

virus

A program with a benign capability that conceals another, sinister purpose is called a

(Multiple Choice)
4.8/5
(35)

You may find a virus

(Multiple Choice)
4.8/5
(34)

According to some estimates, 90 percent of spam is distributed through networks.

(Short Answer)
4.7/5
(31)

A file accompanying an email message is called an .

(Short Answer)
4.8/5
(37)

A self-contained program that spreads through a computer network by exploiting security holes is called a

(Multiple Choice)
4.8/5
(39)

Vote-counting irregularities in the State of in the 2000 U.S. Presidential election led to more interest in computerized voting systems.

(Short Answer)
4.9/5
(32)

The criminalizes a wide variety of hacker-related activities.

(Short Answer)
4.8/5
(42)

A is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.

(Short Answer)
4.9/5
(33)

The Internet worm was released by

(Multiple Choice)
4.8/5
(34)

The process of determining that a user has permission to perform a particular action on a computer is called

(Multiple Choice)
4.8/5
(35)

A piece of self-replicating code embedded within another program is called a

(Multiple Choice)
4.9/5
(25)

An intentional action designed to prevent legitimate users from making use of a computer service is called a .

(Short Answer)
4.8/5
(30)

A is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.

(Short Answer)
4.8/5
(29)

A software program that responds to commands sent by a command-and-control program located on an external computer is called a

(Multiple Choice)
4.8/5
(28)

The manipulation of a person inside an organization to gain access to confidential information is called .

(Short Answer)
4.7/5
(36)

Manipulating someone within an organization to gain access to confidential information is called

(Multiple Choice)
4.8/5
(42)

An intentional action designed to prevent legitimate users from making use of a computer service is called

(Multiple Choice)
4.7/5
(35)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)