Filters
Question type

Study Flashcards

Trash collection,also known as ____,is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.


A) dumpster diving
B) digital recycling
C) dumpster surfing
D) trash surfing

Correct Answer

verifed

verified

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there.This issue is an example of a(n) ____.


A) unintentional attack
B) malicious attack
C) denial-of-service attack
D) trap door attack

Correct Answer

verifed

verified

What configuration has the highest level of risk?


A) LAN with Internet
B) LAN without Internet
C) Single computer without e-mail or Internet
D) LAN with firewall

Correct Answer

verifed

verified

Generally,____ antivirus software compares file sizes (checking for added code when none is expected) ,looks for replicating instructions,and searches for unusual file activity.


A) diagnostic
B) preventive
C) reactive
D) firewall

Correct Answer

verifed

verified

An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup.


A) incremental
B) layered
C) phased
D) recovery-based

Correct Answer

verifed

verified

A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.

Correct Answer

verifed

verified

Partial network encryption,also called communications encryption,is the most extreme form of encryption.

Correct Answer

verifed

verified

A gap in system security in always indicative of malicious activity.

Correct Answer

verifed

verified

In public/private key encryption,the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.

Correct Answer

verifed

verified

Wiretapping involves the capability of authorized users to search through storage,directories,or files for private information.

Correct Answer

verifed

verified

One major disadvantage of encryption is that ____.


A) it increases the system's overhead
B) it is inconvenient for users
C) it is prohibitive in cost
D) it is often ineffective

Correct Answer

verifed

verified

Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.

Correct Answer

verifed

verified

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.


A) Spoofing
B) Phishing
C) Impersonating
D) Acting

Correct Answer

verifed

verified

____ peruse data packets as they pass by,examine each one for specific information,and log copies of interesting packets for more detailed examination.


A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters

Correct Answer

verifed

verified

A ____ combines into one program the characteristics of other attacks.


A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat

Correct Answer

verifed

verified

It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.


A) .008788 seconds
B) 4.5 seconds
C) 2.5 hours
D) 58 hours

Correct Answer

verifed

verified

The IEEE and the Association for Computing Machinery (ACM)issued a standard of ethics for the global computing community in 1977.

Correct Answer

verifed

verified

The object used by the Kerberos protocol to provide client verification is known as a ____.


A) password
B) passphrase
C) token
D) ticket

Correct Answer

verifed

verified

Using ____,a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address,destination address,and protocol are all correct.


A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software

Correct Answer

verifed

verified

What strategy contributes most to system recovery?


A) authentication
B) integrity checking
C) data replication
D) encryption

Correct Answer

verifed

verified

Showing 21 - 40 of 40

Related Exams

Show Answer