Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






I, II, and III - True

I and II only - False

II and III only - False

I and III only - False

  1. Which of the following is (are) true regarding the use of checksums for virus detection?
  • A checksum is a number that is calculated by combining the binary values of all bytes in a file.
  • This technique helps detect viruses that insert themselves into unused portions of a program.
  • This technique can be used even when there is no virus-free copy of the program when the checksum is first taken.

I and II only - True

I, II, and III - False

I and III only - False

II and III only - False

  1. Which of the following is (are) true regarding the use of the signature-search technique for virus detection?
  • This is the technique used by most of today's anti-virus software.
  • This technique can even detect viruses whose signature is unknown when the technique is first applied.

I only - True

I and II - False

II only - False

None - False

  1. Home computers are generally vulnerable to security threats for which of the following reasons?
  • Cable modem networks and wireless networks can be eavesdropped on.
  • Many home computers are not securely configured.
  • Many home users would not detect that their computer's security has been breached.

I, II, and III - True

I and II only - False

II and III only - False

I and III only - False

  1. Motivations for computer system attackers include which of the following?
  • Fun
  • Revenge
  • Profit

I, II, and III - True

I and II only - False

II and III only - False

I and III only - False

  1. Intruders can gain information about a computer system by which of the following means?
  • Creating an excessive amount of network traffic
  • Capturing network packets
  • Asking users for information

II and III only - True

I, II, and III - False

I and II only - False

II only - False

  1. The dictionary attack against a computer system involves

Trying to guess a password by using every word in the dictionary - True

Using complicated words to trick users into providing information - False

Trying to guess a password by using various alphanumeric combinations - False

Infecting the spell-checker dictionary with macro viruses - False

  1. An intruder pretending to be an employee of a company asking the company's network administrator for sensitive information is an example of a _____ attack.

Social engineering - True

Spoofing - False

Cracking - False

Brute force - False

  1. Modification of network packets by intruders to make the packets appear to be coming from inside a private network is an example of a _____ attack.

Spoofing - True

Cracking - False

Social engineering - False

Brute force - False

  1. An intruder sending email messages that appear to be coming from a system administrator is an example of a _____ attack.

Spoofing - True

Brute force - False

Cracking - False

Packet sniffing - False

  1. Which of the following means of providing password information to Internet Service Providers is (are) considered safe?
  • Phone
  • Email

None - True



I only - False

II only - False

I and II - False

  1. Unencrypted information is referred to as

Plaintext - True

Ciphertext - False

Key - False

Key space - False

  1. The set of all possible keys for an encryption algorithm is known as its

Key space - True

Cryptography factor - False

Cipher count - False

Brute force - False

  1. Which of the following is (are) true regarding smart card chips used for authentication?
  • They contain a tiny microprocessor.
  • They can retain state even without power.
  • They are susceptible to attacks via network.

Date: 2015-12-18; view: 716


<== previous page | next page ==>
I and III only - True | I and II only - True
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.008 sec.)