SCIA 360 Ch 11

Ace your homework & exams now with Quizwiz!

It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. .008788 seconds 4.5 seconds 2.5 hours 58 hours

.008788 seconds

What configuration has the highest level of risk? LAN with Internet LAN without Internet Single computer without e-mail or Internet LAN with firewall

LAN with internet

____ viruses infect data files. File infector Boot sector Master boot record Macro

Macro

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. Spoofers Proxy servers Packet sniffers Packet filters

Packet sniffers

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. Spoofing Phishing Impersonating Acting

Phishing

____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device. Picture passwords fingerprint scanner biometric scanner retina scanner

Picture passwords

Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes. worm masquerade program Trojan horse virtual login console

Trojan horse

A ____ combines into one program the characteristics of other attacks. Trojan Horse worm multi-thread virus blended threat

blended threat

What strategy contributes most to system recovery? authentication integrity checking data replication encryption

data replication

Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity. diagnostic preventive reactive firewall

diagnostic

Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. dumpster diving digital recycling dumpster surfing trash surfing

dumpster diving

One major disadvantage of encryption is that ____. it increases the system's overhead it is inconvenient for users it is prohibitive in cost it is often ineffective

it increases the system's overhead

An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup. incremental layered phased recovery-based

layered

Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct. snooping packet filtering a proxy server anti-virus software

packet filtering

Two methods of active wiretapping are "between lines transmission" and "____." Trojan horse piggyback entry browsing trap doors

piggyback entry

A ____ server hides important network information from outsiders by making the network server invisible. redirection blocking proxy fire

proxy

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____. attack resistance attack survivability system recovery system survivability

system survivability

The immediate result of a worm is ____. not noticeable until later the slower processing time of legitimate work complete data loss with little chance of recovery a computer crash with or without a blue screen

the slower processing time of legitimate work

The object used by the Kerberos protocol to provide client verification is known as a ____. password passphrase token ticket

ticket

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____. unintentional attack malicious attack denial-of-service attack trap door attack

unintentional attack


Related study sets

Chapter 26: Newborns and Infants

View Set

MAN 4720 Chapter 9, 10, 11 Final Exam

View Set

Psych Prep U Anger, Hostility, and Aggression

View Set

HUSH WWII Vocab (singapore side)

View Set

BNAD 303 Chapter 16 MIndtap Questions

View Set

Mean Absolute Deviation, Mean Absolute Deviation terms

View Set

EatRight Prep RD Exam Study Cards

View Set

Accounting Chapter 5: Receivables and Sales

View Set

Chapter 13: Fluid and Electrolytes: Balance and Disturbance

View Set