Quiz 18

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

T/F: A logic bomb is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.

False

T/F: A masquerader is a legitimate user who accesses data, programs, or resources for which such access is not authorized.

False

T/F: All parasitic malware is software that replicates.

False

T/F: An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.

False

T/F: Data confidentiality assures that individuals control or influence what information related to them may be collected and stored

False

T/F: Traffic analysis is an active attack.

False

__________ capture keystrokes on a compromised system.

Keyloggers

T/F: A backdoor is the same as a trapdoor.

True

T/F: A macro virus is a larger and more self-contained than an ordinary virus.

True

T/F: A virus can be prepended or postpended to an executable program, or it can be embedded in some other fashion.

True

T/F: A worm is a program that can replicate itself and send copies from computer to computer across network connections

True

T/F: Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.

True

T/F: Security threats can be classified based on how a given attack provides a threat to a given objective.

True

T/F: The three key objectives of computer security are confidentiality, integrity, and availability.

True

A virus can be attached to a program by _________.

all of the above

Important objectives of computer security include:

all of the above

The network vehicle used for worm propagation is ___________.

all of the above

Which of the following is a type of scanning strategy?

all of the above

Which of the following statements regarding macro viruses is true?

all of the above

Which of the following is not an example of intrusion:

all of the above are examples of intrusion

Which of the following statements is generally true regarding the original class of email viruses?

arrive in email attachments

The primary mechanism used in implementing denial-of-service attacks is the:

bot

Of the three classes of intruders into computer systems and networks, the clandestine user is typically:

either an insider or an outsider to the organization

One type of attack on the security of a computer system or network that impacts the availability of a system (e.g. destruction of a resource in the system) is referred to as ___________.

interruption

A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

none of the above

The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

passive attacks

The stage of a virus where it is activated to perform the function for which it was intended is referred to as the _________.

triggering phase


संबंधित स्टडी सेट्स

Biochemistry Learning Curve Chapter 5.1, 5.2

View Set

Personal and Community Health Chapters 3 & 4

View Set

Chapter 57: Drugs Affecting Gastrointestinal Secretions

View Set

Lesson 2: Job Opportunities for Entrepreneurship as a Career

View Set

History and geography 805 study set

View Set

College Biology Exam Review - Chapter 9

View Set