Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Data Communications
Exam 18: Computer and Network Security Threats
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system) is referred to as ___________.
Question 22
Multiple Choice
The network vehicle used for worm propagation is ___________.
Question 23
True/False
The three key objectives of computer security are confidentiality, integrity,and availability.
Question 24
Multiple Choice
The primary mechanism used in implementing denial-of-service attacks is the:
Question 25
Short Answer
An example of __________ is an adversary gaining unauthorized access to sensitive data by overcoming the system's access control protections.
Question 26
Multiple Choice
Which of the following statements regarding macro viruses is true?
Question 27
Multiple Choice
Which of the following statements is generally true regarding the original class of email viruses?
Question 28
Short Answer
Also known as a zombie or drone,a __________ is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the creator.
Question 29
True/False
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
Question 30
Short Answer
An example of _________ is traffic analysis,in which an adversary is able to gain information from observing the pattern of traffic on a network, such as the amount of traffic between particular pairs of hosts on the network.