Deck 7: Computer and Network Security

ملء الشاشة (f)
exit full mode
سؤال
Manipulating someone within an organization to gain access to confidential information is called
a) diving.
b) hacking.
c) phreaking.
d) social engineering.
e) trashing.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The Internet worm was released by
a) John Barlow.
b) Katie Hafner.
c) John Markoff.
d) Robert Morris, Jr.
e) Bruce Sterling.
سؤال
Anonymous is
a) an activist group that promotes the interests of the Recording Industry Association of America.
b) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
c) the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world.
d) the name of the group that launched the Stuxnet worm.
e) All of the above except c.
سؤال
The Social Security numbers and other personal information from 22 million Americans were stolen by hackers from computers managed by the Office of Personnel Management, and the prime suspect was a group of hackers located in
a) Afghanistan.
b) China.
c) Iran.
d) North Korea.
e) Russia.
سؤال
A software program that responds to commands sent by a command-and-control program located on an external computer is called a
a) bot.
b) spoof.
c) vampire.
d) virus.
e) worm.
سؤال
An intentional action designed to prevent legitimate users from making use of a computer service over the Internet is called
a) a bombing run.
b) a curtain closer.
c) a denial-of-service attack.
d) an electronic overdose.
e) phreaking.
سؤال
A program with a benign capability that conceals another, sinister purpose is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
سؤال
The Conficker worm is notable because
a) it is Cuba's first attempt at cyberwarfare.
b) it is the fastest spreading worm of all time.
c) it shut down the White House Web site for three days.
d) it continues to infect computers many years after it was first discovered.
e) All of the above.
سؤال
A self-contained program that spreads through a computer network by exploiting security holes is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
سؤال
You may find a virus
a) on a hard disk.
b) on a thumb drive.
c) on a CD-ROM.
d) in an email attachment.
e) All of the above
سؤال
What happened when the FBI asked Apple to create a new version of the iOS operating system was would allow the FBI to gain access to the locked iPhone of Syed Rizwan Farook?
a) Apple created the new version of iOS and gave the FBI a copy.
b) Apple created the new version of iOS and made it publicly available, so not just the FBI would have a copy.
c) Apple created the new version of iOS but required FBI to bring the iPhone to Apple's headquarters in Cupertino to install it on the Farook's iPhone.
d) Apple denied the request and chose to fight the FBI in court.
e) Apple threatened to move its headquarters to Vancouver, Canada, unless the US government dropped its unreasonable request.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/11
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Computer and Network Security
1
Manipulating someone within an organization to gain access to confidential information is called
a) diving.
b) hacking.
c) phreaking.
d) social engineering.
e) trashing.
social engineering
2
The Internet worm was released by
a) John Barlow.
b) Katie Hafner.
c) John Markoff.
d) Robert Morris, Jr.
e) Bruce Sterling.
Robert Morris, Jr
3
Anonymous is
a) an activist group that promotes the interests of the Recording Industry Association of America.
b) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
c) the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world.
d) the name of the group that launched the Stuxnet worm.
e) All of the above except c.
a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites
4
The Social Security numbers and other personal information from 22 million Americans were stolen by hackers from computers managed by the Office of Personnel Management, and the prime suspect was a group of hackers located in
a) Afghanistan.
b) China.
c) Iran.
d) North Korea.
e) Russia.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
5
A software program that responds to commands sent by a command-and-control program located on an external computer is called a
a) bot.
b) spoof.
c) vampire.
d) virus.
e) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
6
An intentional action designed to prevent legitimate users from making use of a computer service over the Internet is called
a) a bombing run.
b) a curtain closer.
c) a denial-of-service attack.
d) an electronic overdose.
e) phreaking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
7
A program with a benign capability that conceals another, sinister purpose is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Conficker worm is notable because
a) it is Cuba's first attempt at cyberwarfare.
b) it is the fastest spreading worm of all time.
c) it shut down the White House Web site for three days.
d) it continues to infect computers many years after it was first discovered.
e) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
9
A self-contained program that spreads through a computer network by exploiting security holes is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
10
You may find a virus
a) on a hard disk.
b) on a thumb drive.
c) on a CD-ROM.
d) in an email attachment.
e) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
11
What happened when the FBI asked Apple to create a new version of the iOS operating system was would allow the FBI to gain access to the locked iPhone of Syed Rizwan Farook?
a) Apple created the new version of iOS and gave the FBI a copy.
b) Apple created the new version of iOS and made it publicly available, so not just the FBI would have a copy.
c) Apple created the new version of iOS but required FBI to bring the iPhone to Apple's headquarters in Cupertino to install it on the Farook's iPhone.
d) Apple denied the request and chose to fight the FBI in court.
e) Apple threatened to move its headquarters to Vancouver, Canada, unless the US government dropped its unreasonable request.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.