CSUDH CTC 452 - Quizzes 1

Ace your homework & exams now with Quizwiz!

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus

Macro

Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

Man-in-the-middle

What can an attacker use a port scanner to test for on a target computer?

Open sockets

Which security layer verifies the identity of a user, service, or computer?

Repudiation

What is a VPN typically used for?

Secure Remote Access

Which term is best described as an attack that relies on the gullibility of people?

Social engineering

Defense in depth can best be described as which of the following?

A layered approach to secuirty

Which of the following NOT one of the three primary goals of information security

Availability

In which form of authentication does the authenticating device generate a random code and send it to the basic user who wants to be authenticated?

Basic

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

Trojan


Related study sets

HESI Case Studies--Medical/Surgical-Myasthenia Gravis (Shiri Koradia)

View Set

Endocrine: Lecture 11: Parathyroid hormone (PTH)

View Set

IB Psychology HL List of Studies (May 2021)

View Set

Role of Emotions in Ethical Decision Making- Week 7 Notes

View Set

Chapter 26: The Reproductive System

View Set