Deck 18: Computer and Network Security Threats

ملء الشاشة (f)
exit full mode
سؤال
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as:

A)Interruption
B)Interception
C)Modification
D)All of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
سؤال
A stealth virus is explicitly designed to hide itself from detection by antivirus software.
سؤال
All parasitic malware is software that replicates.
سؤال
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of:

A)Active attacks
B)Passive attacks
C)Administrative attacks
D)None of the above
سؤال
A macro virus is a larger and more self-contained than an ordinary virus.
سؤال
Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.
سؤال
Important objectives of computer security include:

A)Confidentiality
B)Integrity
C)Availability
D)All of the above
سؤال
Which of the following is not an example of intrusion:

A)Guessing and cracking passwords
B)Running a packet sniffer on a workstation to capture user names and passwords
C)Using an unattended,logged-in workstation without permission
D)All of the above are examples of intrusion
سؤال
A backdoor is the same as a trapdoor.
سؤال
Traffic analysis is an active attack.
سؤال
An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
سؤال
The three key objectives of computer security are confidentiality,integrity,and availability.
سؤال
A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.
سؤال
A masquerader is a legitimate user who accesses data,programs,or resources for which such access is not authorized.
سؤال
Of the three classes of intruders into computer systems and networks,the clandestine user is typically:

A)An insider to the organization
B)An outsider to the organization
C)Either an insider or an outsider to the organization
D)None of the above
سؤال
A worm is a program that can replicate itself and send copies from computer to computer across network connections.
سؤال
Most viruses carry out their work in a manner that is specific to a particular operating system.
سؤال
A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked,performs some unwanted or harmful function.
سؤال
A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

A)Logic bomb
B)Trojan horse
C)Virus
D)None of the above
سؤال
A worm that can attack a variety of OSs rather than a single OS such as Windows is:

A)Multiplatform
B)Multi-exploit
C)Polymorphic
D)Metamorphic
سؤال
The network vehicle used for worm propagation is:

A)Electronic mail facility
B)Remote execution capability
C)Remote login capability
D)All of the above
سؤال
Which of the following statements regarding macro viruses is true:

A)A macro virus is platform independent
B)Macro viruses infect documents,not executable portions of code
C)Macro viruses are easily spread
D)All of the above
سؤال
The primary mechanism used in implementing denial-of-service attacks is the:

A)Worm
B)Trojan horse
C)Bot
D)All of the above
سؤال
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the:

A)Propagation phase
B)Triggering phase
C)Execution phase
D)None of the above
سؤال
Which of the following statements is generally true regarding the original class of email viruses:

A)It sends itself to selected names on the user's email mailing list
B)Arrive in email attachments
C)Usually do no local damage on the infected machine
D)All of the above
سؤال
A virus can be attached to a program by:

A)Prepending
B)Postpending
C)Embedding other than at the beginning or end
D)All of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/27
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 18: Computer and Network Security Threats
1
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as:

A)Interruption
B)Interception
C)Modification
D)All of the above
A
2
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
False
3
A stealth virus is explicitly designed to hide itself from detection by antivirus software.
True
4
All parasitic malware is software that replicates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
5
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of:

A)Active attacks
B)Passive attacks
C)Administrative attacks
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
6
A macro virus is a larger and more self-contained than an ordinary virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
7
Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
8
Important objectives of computer security include:

A)Confidentiality
B)Integrity
C)Availability
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not an example of intrusion:

A)Guessing and cracking passwords
B)Running a packet sniffer on a workstation to capture user names and passwords
C)Using an unattended,logged-in workstation without permission
D)All of the above are examples of intrusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
10
A backdoor is the same as a trapdoor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
11
Traffic analysis is an active attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
12
An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
13
The three key objectives of computer security are confidentiality,integrity,and availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
14
A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
15
A masquerader is a legitimate user who accesses data,programs,or resources for which such access is not authorized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
16
Of the three classes of intruders into computer systems and networks,the clandestine user is typically:

A)An insider to the organization
B)An outsider to the organization
C)Either an insider or an outsider to the organization
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
17
A worm is a program that can replicate itself and send copies from computer to computer across network connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
18
Most viruses carry out their work in a manner that is specific to a particular operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
19
A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked,performs some unwanted or harmful function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
20
A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

A)Logic bomb
B)Trojan horse
C)Virus
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
21
A worm that can attack a variety of OSs rather than a single OS such as Windows is:

A)Multiplatform
B)Multi-exploit
C)Polymorphic
D)Metamorphic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
22
The network vehicle used for worm propagation is:

A)Electronic mail facility
B)Remote execution capability
C)Remote login capability
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following statements regarding macro viruses is true:

A)A macro virus is platform independent
B)Macro viruses infect documents,not executable portions of code
C)Macro viruses are easily spread
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
24
The primary mechanism used in implementing denial-of-service attacks is the:

A)Worm
B)Trojan horse
C)Bot
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
25
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the:

A)Propagation phase
B)Triggering phase
C)Execution phase
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following statements is generally true regarding the original class of email viruses:

A)It sends itself to selected names on the user's email mailing list
B)Arrive in email attachments
C)Usually do no local damage on the infected machine
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
27
A virus can be attached to a program by:

A)Prepending
B)Postpending
C)Embedding other than at the beginning or end
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.