network defense ch 1

Ace your homework & exams now with Quizwiz!

A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses. True or False

False

A worm creates files that copy themselves repeatedly and consume disk space. True or False

True

Physical security protects a system from theft, fire, or environmental disaster. True or False

True

With discretionary access control, network users can share information with other users, making it more risky than MAC. True or False

True

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following? a. botnet b. Trojan c. logic bomb d. packet monkey

botnet

A hactivist can best be described as which of the following? a. an unskilled programmer that spreads malicious scripts, b. consider themselves seekers of knowledge, c. use DoS attacks on Web sites with which they disagree, d. deface Web sites by leaving messages for their friends to read

c. use DoS attacks on Web sites with which they disagree

What is a program that appears to do something useful but is actually malware? a. virus b. logic bomb c. Trojan d. back door

Trojan

Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred. True or False

False

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus? a. worm b. macro c. back door d. Trojan

macro


Related study sets

Section 4 Module 3 - Kiddie Tax, Charitable Contributions, AMT, Imputed Interest

View Set

Microsoft AZ-900 Cloud Concepts - Principles of cloud computing

View Set

Health Benefits of Physical Activity

View Set

A&P Lab- Week Two: Exercises 4 & 5 (questions)

View Set

Chapter 9: Toward Late Baroque Instrumental Music

View Set

Thomas Jefferson (3rd President)

View Set

infection control/prevention prepu lvls 5-6

View Set