Quiz 18
T/F: A logic bomb is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.
False
T/F: A masquerader is a legitimate user who accesses data, programs, or resources for which such access is not authorized.
False
T/F: All parasitic malware is software that replicates.
False
T/F: An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
False
T/F: Data confidentiality assures that individuals control or influence what information related to them may be collected and stored
False
T/F: Traffic analysis is an active attack.
False
__________ capture keystrokes on a compromised system.
Keyloggers
T/F: A backdoor is the same as a trapdoor.
True
T/F: A macro virus is a larger and more self-contained than an ordinary virus.
True
T/F: A virus can be prepended or postpended to an executable program, or it can be embedded in some other fashion.
True
T/F: A worm is a program that can replicate itself and send copies from computer to computer across network connections
True
T/F: Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.
True
T/F: Security threats can be classified based on how a given attack provides a threat to a given objective.
True
T/F: The three key objectives of computer security are confidentiality, integrity, and availability.
True
A virus can be attached to a program by _________.
all of the above
Important objectives of computer security include:
all of the above
The network vehicle used for worm propagation is ___________.
all of the above
Which of the following is a type of scanning strategy?
all of the above
Which of the following statements regarding macro viruses is true?
all of the above
Which of the following is not an example of intrusion:
all of the above are examples of intrusion
Which of the following statements is generally true regarding the original class of email viruses?
arrive in email attachments
The primary mechanism used in implementing denial-of-service attacks is the:
bot
Of the three classes of intruders into computer systems and networks, the clandestine user is typically:
either an insider or an outsider to the organization
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g. destruction of a resource in the system) is referred to as ___________.
interruption
A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:
none of the above
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.
passive attacks
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the _________.
triggering phase