CSUDH CTC 452 - Quizzes 1
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus
Macro
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
Man-in-the-middle
What can an attacker use a port scanner to test for on a target computer?
Open sockets
Which security layer verifies the identity of a user, service, or computer?
Repudiation
What is a VPN typically used for?
Secure Remote Access
Which term is best described as an attack that relies on the gullibility of people?
Social engineering
Defense in depth can best be described as which of the following?
A layered approach to secuirty
Which of the following NOT one of the three primary goals of information security
Availability
In which form of authentication does the authenticating device generate a random code and send it to the basic user who wants to be authenticated?
Basic
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
Trojan