Deck 18: Computer and Network Security Threats
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/27
Play
Full screen (f)
Deck 18: Computer and Network Security Threats
1
One type of attack on the security of a computer system or network that impacts the availability of a system (e.g.destruction of a resource in the system)is referred to as:
A)Interruption
B)Interception
C)Modification
D)All of the above
A)Interruption
B)Interception
C)Modification
D)All of the above
A
2
Data confidentiality assures that individuals control or influence what information related to them may be collected and stored.
False
3
A stealth virus is explicitly designed to hide itself from detection by antivirus software.
True
4
All parasitic malware is software that replicates.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
5
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of:
A)Active attacks
B)Passive attacks
C)Administrative attacks
D)None of the above
A)Active attacks
B)Passive attacks
C)Administrative attacks
D)None of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
6
A macro virus is a larger and more self-contained than an ordinary virus.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
7
Repudiation refers to a user either denying sending data or a user denying receiving or possessing the data.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
8
Important objectives of computer security include:
A)Confidentiality
B)Integrity
C)Availability
D)All of the above
A)Confidentiality
B)Integrity
C)Availability
D)All of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not an example of intrusion:
A)Guessing and cracking passwords
B)Running a packet sniffer on a workstation to capture user names and passwords
C)Using an unattended,logged-in workstation without permission
D)All of the above are examples of intrusion
A)Guessing and cracking passwords
B)Running a packet sniffer on a workstation to capture user names and passwords
C)Using an unattended,logged-in workstation without permission
D)All of the above are examples of intrusion
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
10
A backdoor is the same as a trapdoor.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
11
Traffic analysis is an active attack.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
12
An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
13
The three key objectives of computer security are confidentiality,integrity,and availability.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
14
A virus can be prepended or postpended to an executable program,or it can be embedded in some other fashion.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
15
A masquerader is a legitimate user who accesses data,programs,or resources for which such access is not authorized.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
16
Of the three classes of intruders into computer systems and networks,the clandestine user is typically:
A)An insider to the organization
B)An outsider to the organization
C)Either an insider or an outsider to the organization
D)None of the above
A)An insider to the organization
B)An outsider to the organization
C)Either an insider or an outsider to the organization
D)None of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
17
A worm is a program that can replicate itself and send copies from computer to computer across network connections.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
18
Most viruses carry out their work in a manner that is specific to a particular operating system.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
19
A logic bomb is a useful,or apparently useful,program or command procedure containing hidden code that,when invoked,performs some unwanted or harmful function.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
20
A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:
A)Logic bomb
B)Trojan horse
C)Virus
D)None of the above
A)Logic bomb
B)Trojan horse
C)Virus
D)None of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
21
A worm that can attack a variety of OSs rather than a single OS such as Windows is:
A)Multiplatform
B)Multi-exploit
C)Polymorphic
D)Metamorphic
A)Multiplatform
B)Multi-exploit
C)Polymorphic
D)Metamorphic
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
22
The network vehicle used for worm propagation is:
A)Electronic mail facility
B)Remote execution capability
C)Remote login capability
D)All of the above
A)Electronic mail facility
B)Remote execution capability
C)Remote login capability
D)All of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following statements regarding macro viruses is true:
A)A macro virus is platform independent
B)Macro viruses infect documents,not executable portions of code
C)Macro viruses are easily spread
D)All of the above
A)A macro virus is platform independent
B)Macro viruses infect documents,not executable portions of code
C)Macro viruses are easily spread
D)All of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
24
The primary mechanism used in implementing denial-of-service attacks is the:
A)Worm
B)Trojan horse
C)Bot
D)All of the above
A)Worm
B)Trojan horse
C)Bot
D)All of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
25
The stage of a virus where it is activated to perform the function for which it was intended is referred to as the:
A)Propagation phase
B)Triggering phase
C)Execution phase
D)None of the above
A)Propagation phase
B)Triggering phase
C)Execution phase
D)None of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following statements is generally true regarding the original class of email viruses:
A)It sends itself to selected names on the user's email mailing list
B)Arrive in email attachments
C)Usually do no local damage on the infected machine
D)All of the above
A)It sends itself to selected names on the user's email mailing list
B)Arrive in email attachments
C)Usually do no local damage on the infected machine
D)All of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
27
A virus can be attached to a program by:
A)Prepending
B)Postpending
C)Embedding other than at the beginning or end
D)All of the above
A)Prepending
B)Postpending
C)Embedding other than at the beginning or end
D)All of the above
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck