ITS-235 Quiz 11

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

True

A logic bomb often spreads unnoticed throughout a network until a predetermined event, when it goes off and does its damage. True / False

proxy

A(n) ____ server hides important network information from outsiders by making network server invisible.

firewall

A(n) ___________________ is hardware and/or software designed to protect a system by disguising its IP address from outsiders who don't have authorization to access it or ask for information about it.

b. smart card

As an alternative to passwords, some systems have integrated use of a ____. a. fingerprint scanner b. smart card c. retina scanner d. biometric scanner

a. unintentional attack

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____. a. unintentional attack b. malicious attack c. denial-of-service attack d. trap door attack

True

Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors. True / False

True

In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message. True / False

False (Intrusion recognition patterns)

Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions. True / False

a. .008788 seconds

It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. a. .008788 seconds b. 4.5 seconds c. 2.5 hours d. 58 hours

True

One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT. True / False

False (Total network encryption)

Partial network encryption, also called communications encryption, is the most extreme form of encryption. True / False

False (1992)

The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community in 1977. True / False

d. the slower processing time of legitimate work

The immediate result of a worm is ____. a. complete data loss with little chance of recovery b. not noticeable until later c. a computer crash with or without a blue screen d. the slower processing time of legitimate work

a. the slower processing time of legitimate work

The immediate result of a worm is ____. a. the slower processing time of legitimate work b. a computer crash with or without a blue screen c. complete data loss with little chance of recovery d. not noticeable until later

a. ticket

The object used by the Kerberos protocol to provide client verification is known as a ____. a. ticket b. passphrase c. password d. token

biometrics

The science and technology of identifying authorized users based on their biological characteristics best describes ____________.

a. dumpster diving

Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. a. dumpster diving b. dumpster surfing c. digital recycling d. trash surfing

d. Phishing

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. a. Acting b. Impersonating c. Spoofing d. Phishing

b. Packet sniffers

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. a. Spoofers b. Packet sniffers c. Proxy servers d. Packet filters

d. Macro

____ viruses infect data files. a. Boot sector b. Master boot record c. File infector d. Macro

b. Macro

____ viruses infect data files. a. File infector b. Macro c. Master boot record d. Boot sector

Antivirus

____________ software refers to software that is designed to detect and recover attacks by viruses and worms and is usually part of a system protection software package.

Social

_____________ engineering is a technique whereby system intruders gain access to information about a legitimate user to learn active passwords, sometimes by calling the user and posing as a system technician.

Ethics

_____________ refer to the rules or standards of behavior that individuals are expected to follow demonstrating the principles of right and wrong.

Spoofing

______________ is a security threat that relies on clear text transmission, whereby assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.


संबंधित स्टडी सेट्स

test 5, exotics, invasive species

View Set

Win10 Chapter 4 Point Quiz results

View Set

Alfred Binet (1857-1911) The Intelligence of an Individual is not a Fixed Quantity

View Set

Wordly Wise 3000, book 2, lesson 15

View Set