Deck 14: Computer Security Threats

ملء الشاشة (f)
exit full mode
سؤال
Hardware is the most vulnerable to attack and the least susceptible to automated controls.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Obstruction is when an entity assumes unauthorized logical or physical control of a system resource.
سؤال
Repudiation is when an entity deceives another by falsely denying responsibility for
an act.
سؤال
Unauthorized disclosure is a threat to authenticity.
سؤال
_________ assures that systems work promptly and service is not denied to authorized users.

A) System integrity
B) Availability
C) Confidentiality
D) Privacy
سؤال
A loss of _________ is the unauthorized modification or destruction of information.

A) accountability
B) authenticity
C) integrity
D) confidentiality
سؤال
A rootkit is a set of programs installed on a system to maintain administrator access to that system.
سؤال
A loss of _________ is the disruption of access to, or use of, information or an information system.

A) integrity
B) confidentiality
C) availability
D) authenticity
سؤال
One way to obstruct system operation is to overload the system by placing excess burden on communication traffic or processing resources.
سؤال
A stealth virus is a form of virus where just the payload is hidden.
سؤال
Deception is a threat to availability or system integrity.
سؤال
Software piracy is an example of a software confidentiality threat.
سؤال
Insider attacks are among the easiest to detect and prevent.
سؤال
An active attack attempts to alter system resources or affect their operation.
سؤال
Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.
سؤال
Nimda has worm, virus, and mobile code characteristics.
سؤال
_________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

A) Data confidentiality
B) System integrity
C) Privacy
D) Data integrity
سؤال
A loss of confidentiality is the unauthorized disclosure of information.
سؤال
Traditionally, those who hack into computers do so for the thrill of it or for status.
سؤال
_________ assures that private or confidential information is not made available or disclosed to unauthorized individuals.

A) Privacy
B) Availability
C) Data confidentiality
D) Integrity
سؤال
__________ assures that information and programs are changed only in a specified and authorized manner.
سؤال
A backdoor used by programmers to debug and test programs is called a __________ .

A) programmer entrance
B) trapdoor
C) maintenance hook
D) hacker door
سؤال
_________ is when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.

A) Misappropriation
B) Interception
C) Corruption
D) Masquerade
سؤال
Defacing a Web server, running a packet sniffer on a workstation to capture user names and passwords, viewing sensitive data without authorization, and copying a database containing credit card numbers, are all examples of _________ .
سؤال
_________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.
سؤال
__________ means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.
سؤال
_________ can occur either by means of malicious logic or a hacker that has gained unauthorized access to a system.

A) Misuse
B) Misappropriation
C) Interception
D) Repudiation
سؤال
A _________ is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.

A) worm
B) Spyware
C) mobile code
D) Trojan horse
سؤال
Masquerade, falsification, and repudiation are attacks resulting in a __________ threat consequence.
سؤال
The event or condition that determines when the payload is activated or delivered is the _________ .

A) payload
B) trigger
C) infection mechanism
D) infection vector
سؤال
Three key objectives of computer security are: confidentiality, availability, and _________ .
سؤال
Use Trojan horses to leave backdoors for reentry, use sniffer to capture passwords, act quickly and precisely to make their activities harder to detect, and make few or no mistakes, are all examples of _________ patterns of behavior.

A) Phreakers
B) Criminal Enterprise
C) Hackers
D) Internal threat
سؤال
Exposure, interception, inference and intrusion can result in this threat consequence:

A) deception
B) unauthorized disclosure
C) usurpation
D) disruption
سؤال
An example of _________ is known as traffic analysis, in which an adversary is able to gain information from observing the pattern of traffic on a network.

A) intrusion
B) exposure
C) interception
D) inference
سؤال
A _________ attack attempts to learn or make use of information from the system but does not affect system resources.
سؤال
A _________ captures keystrokes on the infected machine.

A) keylogger
B) rootkit
C) scanner
D) sniffer
سؤال
A _________ is a program that can replicate itself and send copies from computer to computer across network connections.

A) zombie
B) bot
C) flooder
D) worm
سؤال
The three key concepts that are at the heart of computer security form what is often referred to as the __________ .
سؤال
__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
سؤال
_________ is a circumstance or event that results in control of system services or functions by an unauthorized entity.
سؤال
A __________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.
سؤال
The _________ facility is what distinguishes a bot from a worm.
سؤال
A _________, also known as a zombie or drone, is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the creator.
سؤال
A computer _________ is a piece of software that can "infect" other programs by modifying them; the modification includes injecting the original program with a routine to make copies of itself, which can then go on to infect other programs.
سؤال
A __________ is a secret entry point into a program that allows someone who is aware of it to gain access without going through the usual security access procedures.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Computer Security Threats
1
Hardware is the most vulnerable to attack and the least susceptible to automated controls.
True
2
Obstruction is when an entity assumes unauthorized logical or physical control of a system resource.
False
3
Repudiation is when an entity deceives another by falsely denying responsibility for
an act.
True
4
Unauthorized disclosure is a threat to authenticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
_________ assures that systems work promptly and service is not denied to authorized users.

A) System integrity
B) Availability
C) Confidentiality
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
A loss of _________ is the unauthorized modification or destruction of information.

A) accountability
B) authenticity
C) integrity
D) confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
A rootkit is a set of programs installed on a system to maintain administrator access to that system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
A loss of _________ is the disruption of access to, or use of, information or an information system.

A) integrity
B) confidentiality
C) availability
D) authenticity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
One way to obstruct system operation is to overload the system by placing excess burden on communication traffic or processing resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
A stealth virus is a form of virus where just the payload is hidden.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Deception is a threat to availability or system integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
Software piracy is an example of a software confidentiality threat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
Insider attacks are among the easiest to detect and prevent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
An active attack attempts to alter system resources or affect their operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Nimda has worm, virus, and mobile code characteristics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
_________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

A) Data confidentiality
B) System integrity
C) Privacy
D) Data integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
A loss of confidentiality is the unauthorized disclosure of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Traditionally, those who hack into computers do so for the thrill of it or for status.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
_________ assures that private or confidential information is not made available or disclosed to unauthorized individuals.

A) Privacy
B) Availability
C) Data confidentiality
D) Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
__________ assures that information and programs are changed only in a specified and authorized manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
A backdoor used by programmers to debug and test programs is called a __________ .

A) programmer entrance
B) trapdoor
C) maintenance hook
D) hacker door
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
_________ is when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.

A) Misappropriation
B) Interception
C) Corruption
D) Masquerade
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
Defacing a Web server, running a packet sniffer on a workstation to capture user names and passwords, viewing sensitive data without authorization, and copying a database containing credit card numbers, are all examples of _________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
_________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
__________ means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
_________ can occur either by means of malicious logic or a hacker that has gained unauthorized access to a system.

A) Misuse
B) Misappropriation
C) Interception
D) Repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
A _________ is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.

A) worm
B) Spyware
C) mobile code
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
Masquerade, falsification, and repudiation are attacks resulting in a __________ threat consequence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
The event or condition that determines when the payload is activated or delivered is the _________ .

A) payload
B) trigger
C) infection mechanism
D) infection vector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
Three key objectives of computer security are: confidentiality, availability, and _________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
Use Trojan horses to leave backdoors for reentry, use sniffer to capture passwords, act quickly and precisely to make their activities harder to detect, and make few or no mistakes, are all examples of _________ patterns of behavior.

A) Phreakers
B) Criminal Enterprise
C) Hackers
D) Internal threat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
Exposure, interception, inference and intrusion can result in this threat consequence:

A) deception
B) unauthorized disclosure
C) usurpation
D) disruption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
An example of _________ is known as traffic analysis, in which an adversary is able to gain information from observing the pattern of traffic on a network.

A) intrusion
B) exposure
C) interception
D) inference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
A _________ attack attempts to learn or make use of information from the system but does not affect system resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
A _________ captures keystrokes on the infected machine.

A) keylogger
B) rootkit
C) scanner
D) sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A _________ is a program that can replicate itself and send copies from computer to computer across network connections.

A) zombie
B) bot
C) flooder
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The three key concepts that are at the heart of computer security form what is often referred to as the __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
_________ is a circumstance or event that results in control of system services or functions by an unauthorized entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
A __________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
The _________ facility is what distinguishes a bot from a worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
A _________, also known as a zombie or drone, is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the creator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
A computer _________ is a piece of software that can "infect" other programs by modifying them; the modification includes injecting the original program with a routine to make copies of itself, which can then go on to infect other programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
A __________ is a secret entry point into a program that allows someone who is aware of it to gain access without going through the usual security access procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.