Deck 11: Security and Ethics

Full screen (f)
exit full mode
Question
The first widely destructive worm infected more than 6,000 systems over several days in 1988.
Use Space or
up arrow
down arrow
to flip the card.
Question
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.
Question
When nonsynchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data."
Question
A logic bomb often spreads unnoticed throughout a network until it goes off and does its damage.
Question
A firewall sits between the network and the individual computers.
Question
One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT.
Question
Software to combat viruses is always preventive.
Question
A gap in system security is always malicious.
Question
The Kerberos protocol does not provide a mechanism for revoking access from users who should no longer have access.
Question
A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.
Question
If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.
Question
Wire tapping is when unauthorized users gain the capability to search through storage, directories, or files for information they aren't privileged to read.
Question
Some viruses are benign.
Question
There are several guaranteed methods of protecting your system from assault.
Question
Any vulnerability at the operating system level opens the entire system to attack.
Question
A master boot record virus infects both the boot record and program files, making them especially difficult to repair.
Question
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.
Question
Backups become significant when a computer virus infects your system.
Question
The most extreme form of encryption is partial encryption.
Question
The only way to remove a Trojan horse is to remove the entire body of the malicious program.
Question
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.
Question
Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct.

A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software
Question
A logic bomb perform its malicious work ____.

A) immediately upon installation
B) at a specified time
C) when activated remotely by the person who planted it
D) when a specified event takes place
Question
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
Question
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.

A) attack resistance
B) attack survivability
C) system recovery
D) system survivability
Question
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

A) worm
B) masquerade program
C) Trojan horse
D) virtual login console
Question
____ viruses infect data files.

A) File infector
B) Boot sector
C) Master boot record
D) Macro
Question
____ has the highest level of risk.

A) LAN with Internet
B) LAN without Internet
C) Single computer without e-mail or Internet
D) They all pose the same level of risk
Question
In 1977 the IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community.
Question
A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.
Question
____ is a strategy that contributes to system recovery.

A) Authentication
B) Integrity checking
C) Data replication
D) Encryption
Question
Two methods of active wire tapping are "between lines transmission" and "____."

A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors
Question
Generally, ____ software to combat viruses compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity.

A) diagnostic
B) preventive
C) reactive
D) firewall
Question
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.

A) dumpster diving
B) recycling
C) dumpster surfing
D) trash surfing
Question
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there; this is an example of a(n) ____.

A) unintentional intrusion
B) malicious attack
C) denial-of-service attack
D) trap door attack
Question
It would take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.

A) .000013 seconds
B) .000338 seconds
C) .008788 seconds
D) 58 hours
Question
The immediate result of a worm is ____.

A) not noticeable
B) slower processing time of legitimate work
C) data loss
D) computer crash
Question
When the entire system is backed up once a week and only the files that were changed that day are backed up daily, this is known as a(n) ____ backup.

A) incremental
B) layered
C) phased
D) recovery-based
Question
Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
Question
A ____ combines into one program the characteristics of other attacks.

A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat
Question
A disadvantage of encryption is ____.

A) It increases the system's overhead.
B) It is inconvenient for users to encrypt and decrypt data.
C) It is prohibitive in cost.
D) It is often ineffective.
Question
The ____ is responsible for monitoring the ethical use of technology.

A) Department of Justice
B) Federal Bureau of Investigation
C) global technology community
D) system owner
Question
A good password is unusual, memorable, and changed often, usually ____.

A) every week
B) every month
C) every 30 to 90 days
D) every year
Question
Public/private key encryption relies on the fact that there is no known formula for factoring large numbers greater than ____ digits.

A) 75
B) 80
C) 110
D) 150
Question
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A) Spoofing
B) Phishing
C) Impersonating
D) Acting
Question
A ____ server hides important network information from outsiders by making the network server invisible.

A) redirection
B) blocking
C) proxy
D) fire
Question
____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination.

A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters
Question
Total network encryption is also known as ____.

A) communications encryption
B) partial encryption
C) complete encryption
D) secure encryption
Question
The object used by the Kerberos protocol to provide client verification is known as a ____.

A) password
B) passphrase
C) token
D) ticket
Question
As an alternative to passwords, some systems have integrated use of a ____.

A) smart card
B) fingerprint scanner
C) biometric scanner
D) retina scanner
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Security and Ethics
1
The first widely destructive worm infected more than 6,000 systems over several days in 1988.
True
2
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.
True
3
When nonsynchronized processes access data records and modify some but not all of a record's fields, it is called "accidental incomplete modification of data."
True
4
A logic bomb often spreads unnoticed throughout a network until it goes off and does its damage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A firewall sits between the network and the individual computers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
One popular authentication tool is Kerberos, a network authentication protocol developed as part of the Athena Project at MIT.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Software to combat viruses is always preventive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A gap in system security is always malicious.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The Kerberos protocol does not provide a mechanism for revoking access from users who should no longer have access.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Wire tapping is when unauthorized users gain the capability to search through storage, directories, or files for information they aren't privileged to read.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Some viruses are benign.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
There are several guaranteed methods of protecting your system from assault.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Any vulnerability at the operating system level opens the entire system to attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A master boot record virus infects both the boot record and program files, making them especially difficult to repair.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Backups become significant when a computer virus infects your system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The most extreme form of encryption is partial encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The only way to remove a Trojan horse is to remove the entire body of the malicious program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct.

A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A logic bomb perform its malicious work ____.

A) immediately upon installation
B) at a specified time
C) when activated remotely by the person who planted it
D) when a specified event takes place
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.

A) attack resistance
B) attack survivability
C) system recovery
D) system survivability
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

A) worm
B) masquerade program
C) Trojan horse
D) virtual login console
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____ viruses infect data files.

A) File infector
B) Boot sector
C) Master boot record
D) Macro
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
____ has the highest level of risk.

A) LAN with Internet
B) LAN without Internet
C) Single computer without e-mail or Internet
D) They all pose the same level of risk
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
In 1977 the IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ is a strategy that contributes to system recovery.

A) Authentication
B) Integrity checking
C) Data replication
D) Encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Two methods of active wire tapping are "between lines transmission" and "____."

A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Generally, ____ software to combat viruses compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity.

A) diagnostic
B) preventive
C) reactive
D) firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.

A) dumpster diving
B) recycling
C) dumpster surfing
D) trash surfing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there; this is an example of a(n) ____.

A) unintentional intrusion
B) malicious attack
C) denial-of-service attack
D) trap door attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
It would take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.

A) .000013 seconds
B) .000338 seconds
C) .008788 seconds
D) 58 hours
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The immediate result of a worm is ____.

A) not noticeable
B) slower processing time of legitimate work
C) data loss
D) computer crash
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
When the entire system is backed up once a week and only the files that were changed that day are backed up daily, this is known as a(n) ____ backup.

A) incremental
B) layered
C) phased
D) recovery-based
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ combines into one program the characteristics of other attacks.

A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
A disadvantage of encryption is ____.

A) It increases the system's overhead.
B) It is inconvenient for users to encrypt and decrypt data.
C) It is prohibitive in cost.
D) It is often ineffective.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
The ____ is responsible for monitoring the ethical use of technology.

A) Department of Justice
B) Federal Bureau of Investigation
C) global technology community
D) system owner
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
A good password is unusual, memorable, and changed often, usually ____.

A) every week
B) every month
C) every 30 to 90 days
D) every year
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Public/private key encryption relies on the fact that there is no known formula for factoring large numbers greater than ____ digits.

A) 75
B) 80
C) 110
D) 150
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A) Spoofing
B) Phishing
C) Impersonating
D) Acting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
A ____ server hides important network information from outsiders by making the network server invisible.

A) redirection
B) blocking
C) proxy
D) fire
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination.

A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Total network encryption is also known as ____.

A) communications encryption
B) partial encryption
C) complete encryption
D) secure encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
The object used by the Kerberos protocol to provide client verification is known as a ____.

A) password
B) passphrase
C) token
D) ticket
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
As an alternative to passwords, some systems have integrated use of a ____.

A) smart card
B) fingerprint scanner
C) biometric scanner
D) retina scanner
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.