CNT4403 Quiz 1
What is a program that appears to do something useful but it actually malware?
Trojan
which security tool works by recognizing signs of a possible attack and sending a notification to an administrator?
IDPS
(T/F) With discretionary access control, network users can share information with other users, making it more risky than MAC
true
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?
RPC attacks
Defense in depth can best be described as ______?
a layered approach to security
Malware that creates networks of infected computers that can be controlled from a central station is referred to as what?
botnet
With which access control method do system administrators establish what information users can share?
mandatory access control
_________is the capability to prevent a participant in an electronic transaction from denying that it performed an action
nonrepudiation
A ________ is reserved for a program that runs in the background to listen for requests for the service it offers
port
Why might you want your security system to provide nonrepudiation?
so a user can't deny sending or receiving a communication
which term is best described as an attack that relies on the gullibility of people?
social engineering
___________ do not require user intervention to be launched; they are self-propagating
worms
(T/F) Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
False
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
quarantine
Which type of firewall policy calls for a firewall to deny all traffic by default?
restrictive policy