SCIA 360 Ch 11
It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. .008788 seconds 4.5 seconds 2.5 hours 58 hours
.008788 seconds
What configuration has the highest level of risk? LAN with Internet LAN without Internet Single computer without e-mail or Internet LAN with firewall
LAN with internet
____ viruses infect data files. File infector Boot sector Master boot record Macro
Macro
____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. Spoofers Proxy servers Packet sniffers Packet filters
Packet sniffers
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. Spoofing Phishing Impersonating Acting
Phishing
____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device. Picture passwords fingerprint scanner biometric scanner retina scanner
Picture passwords
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes. worm masquerade program Trojan horse virtual login console
Trojan horse
A ____ combines into one program the characteristics of other attacks. Trojan Horse worm multi-thread virus blended threat
blended threat
What strategy contributes most to system recovery? authentication integrity checking data replication encryption
data replication
Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity. diagnostic preventive reactive firewall
diagnostic
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. dumpster diving digital recycling dumpster surfing trash surfing
dumpster diving
One major disadvantage of encryption is that ____. it increases the system's overhead it is inconvenient for users it is prohibitive in cost it is often ineffective
it increases the system's overhead
An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup. incremental layered phased recovery-based
layered
Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct. snooping packet filtering a proxy server anti-virus software
packet filtering
Two methods of active wiretapping are "between lines transmission" and "____." Trojan horse piggyback entry browsing trap doors
piggyback entry
A ____ server hides important network information from outsiders by making the network server invisible. redirection blocking proxy fire
proxy
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____. attack resistance attack survivability system recovery system survivability
system survivability
The immediate result of a worm is ____. not noticeable until later the slower processing time of legitimate work complete data loss with little chance of recovery a computer crash with or without a blue screen
the slower processing time of legitimate work
The object used by the Kerberos protocol to provide client verification is known as a ____. password passphrase token ticket
ticket
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____. unintentional attack malicious attack denial-of-service attack trap door attack
unintentional attack
