Filters
Question type

Study Flashcards

When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.

A) True
B) False

Correct Answer

verifed

verified

Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?


A) A logic bomb
B) Dumpster diving
C) A blended threat
D) Shoulder surfing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.


A) Keystroke loggers
B) Spyware
C) Firmware
D) Script loggers

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

__________is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.


A) Terminal resource security
B) Distance-vector routing
C) Direct digital synthesis
D) Link-state routing
E) Select

F) D) and E)
G) B) and C)

Correct Answer

verifed

verified

__________is an example of antispyware software.


A) STOPzilla
B) AndroZip
C) Tumblr
D) Dogpile
E) Select

F) D) and E)
G) A) and C)

Correct Answer

verifed

verified

_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.


A) Corner bolts
B) Identification badges
C) Callback modems
D) Electronic trackers

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following statements is true of firewalls?


A) They protect against external access, but they leave networks unprotected from internal intrusions.
B) They can identify attack signatures, trace patterns, and generate alarms for a network administrator.
C) They monitor network traffic and use the "prevent, detect, and react" approach to security.
D) They cause routers to terminate connections with suspicious sources.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.


A) Intrusion detection systems
B) Proxy servers
C) Identification badges
D) Virtual private networks

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

A) True
B) False

Correct Answer

verifed

verified

__________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.


A) Adware
B) Silverware
C) Freeware
D) Hardware
E) Select

F) C) and D)
G) D) and E)

Correct Answer

verifed

verified

A(n) __________contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.


A) Trojan program
B) PageRank
C) exit application
D) withdrawal suite
E) Select

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.


A) Nonbiometric security measures
B) Virtual security measures
C) Biometric security measures
D) Physical security measures

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

_____ is a computer crime that involves destroying or disrupting computer services.


A) Sabotage
B) Dumpster diving
C) Bombing
D) Keystroke logging

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.


A) back-end systems
B) external databases
C) private networks
D) front-end servers

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.


A) Computer fraud
B) Denial-of-service
C) Keystroke logging
D) Social engineering
E) Select

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Which of the following statements is true of a worm?


A) It is an independent program that can spread itself without attaching itself to a host program.
B) It floods a network or server with service requests to prevent legitimate users' access to the system.
C) It is usually hidden inside a popular program, but it is not capable of replicating itself.
D) It enables a system designer to bypass the security of a system and sneak back into the system later to access files.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following security measures uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?


A) A physical security measure
B) A firewall security measure
C) An e-commerce security measure
D) A biometric security measure

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

A__________is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.


A) blended threat
B) magnetic threat
C) signal threat
D) router threat
E) Select

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

The process of capturing and recording network traffic is referred to as _____.


A) sniffing
B) phishing
C) bombing
D) pharming

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 84

Related Exams

Show Answer