CNT4403 Quiz 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a program that appears to do something useful but it actually malware?

Trojan

which security tool works by recognizing signs of a possible attack and sending a notification to an administrator?

IDPS

(T/F) With discretionary access control, network users can share information with other users, making it more risky than MAC

true

Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?

RPC attacks

Defense in depth can best be described as ______?

a layered approach to security

Malware that creates networks of infected computers that can be controlled from a central station is referred to as what?

botnet

With which access control method do system administrators establish what information users can share?

mandatory access control

_________is the capability to prevent a participant in an electronic transaction from denying that it performed an action

nonrepudiation

A ________ is reserved for a program that runs in the background to listen for requests for the service it offers

port

Why might you want your security system to provide nonrepudiation?

so a user can't deny sending or receiving a communication

which term is best described as an attack that relies on the gullibility of people?

social engineering

___________ do not require user intervention to be launched; they are self-propagating

worms

(T/F) Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.

False

What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?

quarantine

Which type of firewall policy calls for a firewall to deny all traffic by default?

restrictive policy


Ensembles d'études connexes

"The Stone" Vocabulary words, The Stone Review

View Set

Communication Final Exam Evan Griffin

View Set

Contingencies and Commitments/Derivatives and Hedge Accounting /Foreign Currency Transactions and Translation

View Set

Qualitative Research: Data Collection Methods

View Set