In Class Exercises Ch. 3 & 4 (True/False)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The function of homepage hijacking is to change a browser's homepage to point to the attacker's site.

True

The goal of a command injection is to execute commands on a host operating system.

True

Unlike viruses, worms do NOT require a host program in order to survive and replicate.

True

A computer virus is an executable program that attaches to, or infects, other executable programs.

True

A successful denial of service (DoS) attack may create so much network congestion that authorized users cannot access network resources.

True

ActiveX is used by developers to create active content.

True

An electronic mail bomb is a form of malicious macro attack that typically involves an email attachment that contains macros designed to inflict maximum damage.

True

Attacks against confidentiality and privacy, data integrity, and availability of services are all ways malicious code can threaten business.

True

Backdoor programs are typically more dangerous than computer viruses.

True

Because people inside an organization generally have more detailed knowledge to the IT infrastructure than outsiders do, they can place logic bombs more easily.

True

Defense in depth is the practice of layering defenses to increase overall security and provide more reaction time to respond to incidents.

True

A smurf attack tricks users into providing logon information on what appears to be a legitimate website but is in fact a website set up by an attacker to obtain this information.

False

A worm is a self-contained program that has to trick users into running it.

False

Retro viruses counter the ability of antivirus programs to detect changes in infected files.

False

Spyware does NOT use cookies.

False

System infectors are viruses that attack document files containing embedded macro programming capabilities.

False

The four primary types of malicious code attacks are unplanned attacks, planned attacks, direct attacks, and indirect attacks.

False

The term "web defacement" refers to someone gaining unauthorized access to a web server and altering the index page of a site on the server.

False

Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communication protocols.

False

It is common for rootkits to modify parts of the operating system to conceal traces of their presence.

True


संबंधित स्टडी सेट्स

Medsurg - Chapter 13: Fluid and Electrolytes: Balance and Disturbance

View Set