ITS-235 Quiz 11
True
A logic bomb often spreads unnoticed throughout a network until a predetermined event, when it goes off and does its damage. True / False
proxy
A(n) ____ server hides important network information from outsiders by making network server invisible.
firewall
A(n) ___________________ is hardware and/or software designed to protect a system by disguising its IP address from outsiders who don't have authorization to access it or ask for information about it.
b. smart card
As an alternative to passwords, some systems have integrated use of a ____. a. fingerprint scanner b. smart card c. retina scanner d. biometric scanner
a. unintentional attack
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____. a. unintentional attack b. malicious attack c. denial-of-service attack d. trap door attack
True
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors. True / False
True
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message. True / False
False (Intrusion recognition patterns)
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions. True / False
a. .008788 seconds
It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. a. .008788 seconds b. 4.5 seconds c. 2.5 hours d. 58 hours
True
One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT. True / False
False (Total network encryption)
Partial network encryption, also called communications encryption, is the most extreme form of encryption. True / False
False (1992)
The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community in 1977. True / False
d. the slower processing time of legitimate work
The immediate result of a worm is ____. a. complete data loss with little chance of recovery b. not noticeable until later c. a computer crash with or without a blue screen d. the slower processing time of legitimate work
a. the slower processing time of legitimate work
The immediate result of a worm is ____. a. the slower processing time of legitimate work b. a computer crash with or without a blue screen c. complete data loss with little chance of recovery d. not noticeable until later
a. ticket
The object used by the Kerberos protocol to provide client verification is known as a ____. a. ticket b. passphrase c. password d. token
biometrics
The science and technology of identifying authorized users based on their biological characteristics best describes ____________.
a. dumpster diving
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. a. dumpster diving b. dumpster surfing c. digital recycling d. trash surfing
d. Phishing
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. a. Acting b. Impersonating c. Spoofing d. Phishing
b. Packet sniffers
____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. a. Spoofers b. Packet sniffers c. Proxy servers d. Packet filters
d. Macro
____ viruses infect data files. a. Boot sector b. Master boot record c. File infector d. Macro
b. Macro
____ viruses infect data files. a. File infector b. Macro c. Master boot record d. Boot sector
Antivirus
____________ software refers to software that is designed to detect and recover attacks by viruses and worms and is usually part of a system protection software package.
Social
_____________ engineering is a technique whereby system intruders gain access to information about a legitimate user to learn active passwords, sometimes by calling the user and posing as a system technician.
Ethics
_____________ refer to the rules or standards of behavior that individuals are expected to follow demonstrating the principles of right and wrong.
Spoofing
______________ is a security threat that relies on clear text transmission, whereby assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
