OS CHAPTER 14

Ace your homework & exams now with Quizwiz!

An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.

False

The type of attack on communications lines and networks known as traffic analysis belongs to the general category of:

Passive attacks

The three key objectives of computer security are confidentiality, integrity, and availability.

TRUE

The stage of a virus where it is activated to perform the function for which it was intended is referred to as the:

Triggering phase

Which of the following statements regarding macro viruses is true:

platform independent - many microviruses infect Microsoft; infect documents not executable portions of code; easily spread via email

Important objectives of computer security include:

All of the above: Computer security consists mainly of three technical areas: confidentiality, integrity, and authentication or availability. Confidentiality means that information cannot be access by unauthorized parties and is also known as secrecy or privacy.

The network vehicle used for worm propagation is:

All of the above: program, network connections

Which of the following statements is generally true regarding the original class of email viruses:

Arrive in email attachments

The primary mechanism used in implementing denial-of-service attacks is the:

BOT

A logic bomb is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.

FALSE

A masquerader is a legitimate user who accesses data, programs, or resources for which such access is not authorized.

FALSE

Rootkits are installed on a computer by:

Installation by a hacker or a Trojan horse program

A worm that can attack a variety of OSs rather than a single OS such as Windows is:

Multiplatform

A backdoor is the same as a trapdoor.

TRUE

A bot (robot), also known as a zombie or drone, is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the bot's creator.

TRUE

A stealth virus is explicitly designed to hide itself from detection by antivirus software.

TRUE

A virus can be prepended or postpended to an executable program, or it can be embedded in some other fashion.

TRUE

A worm is a program that can replicate itself and send copies from computer to computer across network connections.

TRUE

T / F Most viruses carry out their work in a manner that is specific to a particular operating system.

TRUE

A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

backdoor, trapdoor


Related study sets

Evaluating an Argument on Healthy Eating

View Set