Ch1
With discretionary access control, network users can share information with other users, making it more risky than MAC.
True
What tool do you use to secure remote access by users who utilize the Internet?
VPN
A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.
port
A hactivist can best be described as which of the following?
use DoS attacks on Web sites with which they disagree
Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
False
__________________ are spread by several methods, including running executable code, sharing disks or memory sticks, opening e-mail attachments, and viewing infected or malicious Web pages.
Viruses
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
botnet
Which of the following is NOT one of the three primary goals of information security?
impartiality
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
macro
With which access control method do system administrators establish what information users can share?
mandatory access control
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
quarantine
Which type of firewall policy calls for a firewall to deny all traffic by default?
restrictive policy
What is a VPN typically used for?
secure remote access
Why might you want your security system to provide nonrepudiation?
so a user can't deny sending or receiving a communication
______________________ is the capability to prevent a participant in an electronic transaction from denying that it performed an action.
nonrepudiation