Correct Answer
verified
Multiple Choice
A) A logic bomb
B) Dumpster diving
C) A blended threat
D) Shoulder surfing
Correct Answer
verified
Multiple Choice
A) Keystroke loggers
B) Spyware
C) Firmware
D) Script loggers
Correct Answer
verified
Multiple Choice
A) Terminal resource security
B) Distance-vector routing
C) Direct digital synthesis
D) Link-state routing
E) Select
Correct Answer
verified
Multiple Choice
A) STOPzilla
B) AndroZip
C) Tumblr
D) Dogpile
E) Select
Correct Answer
verified
Multiple Choice
A) Corner bolts
B) Identification badges
C) Callback modems
D) Electronic trackers
Correct Answer
verified
Multiple Choice
A) They protect against external access, but they leave networks unprotected from internal intrusions.
B) They can identify attack signatures, trace patterns, and generate alarms for a network administrator.
C) They monitor network traffic and use the "prevent, detect, and react" approach to security.
D) They cause routers to terminate connections with suspicious sources.
Correct Answer
verified
Multiple Choice
A) Intrusion detection systems
B) Proxy servers
C) Identification badges
D) Virtual private networks
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Adware
B) Silverware
C) Freeware
D) Hardware
E) Select
Correct Answer
verified
Multiple Choice
A) Trojan program
B) PageRank
C) exit application
D) withdrawal suite
E) Select
Correct Answer
verified
Multiple Choice
A) Nonbiometric security measures
B) Virtual security measures
C) Biometric security measures
D) Physical security measures
Correct Answer
verified
Multiple Choice
A) Sabotage
B) Dumpster diving
C) Bombing
D) Keystroke logging
Correct Answer
verified
Multiple Choice
A) back-end systems
B) external databases
C) private networks
D) front-end servers
Correct Answer
verified
Multiple Choice
A) Computer fraud
B) Denial-of-service
C) Keystroke logging
D) Social engineering
E) Select
Correct Answer
verified
Multiple Choice
A) It is an independent program that can spread itself without attaching itself to a host program.
B) It floods a network or server with service requests to prevent legitimate users' access to the system.
C) It is usually hidden inside a popular program, but it is not capable of replicating itself.
D) It enables a system designer to bypass the security of a system and sneak back into the system later to access files.
Correct Answer
verified
Multiple Choice
A) A physical security measure
B) A firewall security measure
C) An e-commerce security measure
D) A biometric security measure
Correct Answer
verified
Multiple Choice
A) blended threat
B) magnetic threat
C) signal threat
D) router threat
E) Select
Correct Answer
verified
Multiple Choice
A) sniffing
B) phishing
C) bombing
D) pharming
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 84
Related Exams