Which of the following is (are) true regarding the use of checksums for virus detection?
A checksum is a number that is calculated by combining the binary values of all bytes in a file.
This technique helps detect viruses that insert themselves into unused portions of a program.
This technique can be used even when there is no virus-free copy of the program when the checksum is first taken.
I and II only - True
I, II, and III - False
I and III only - False
II and III only - False
Which of the following is (are) true regarding the use of the signature-search technique for virus detection?
This is the technique used by most of today's anti-virus software.
This technique can even detect viruses whose signature is unknown when the technique is first applied.
I only - True
I and II - False
II only - False
None - False
Home computers are generally vulnerable to security threats for which of the following reasons?
Cable modem networks and wireless networks can be eavesdropped on.
Many home computers are not securely configured.
Many home users would not detect that their computer's security has been breached.
I, II, and III - True
I and II only - False
II and III only - False
I and III only - False
Motivations for computer system attackers include which of the following?
Fun
Revenge
Profit
I, II, and III - True
I and II only - False
II and III only - False
I and III only - False
Intruders can gain information about a computer system by which of the following means?
Creating an excessive amount of network traffic
Capturing network packets
Asking users for information
II and III only - True
I, II, and III - False
I and II only - False
II only - False
The dictionary attack against a computer system involves
Trying to guess a password by using every word in the dictionary - True
Using complicated words to trick users into providing information - False
Trying to guess a password by using various alphanumeric combinations - False
Infecting the spell-checker dictionary with macro viruses - False
An intruder pretending to be an employee of a company asking the company's network administrator for sensitive information is an example of a _____ attack.
Social engineering - True
Spoofing - False
Cracking - False
Brute force - False
Modification of network packets by intruders to make the packets appear to be coming from inside a private network is an example of a _____ attack.
Spoofing - True
Cracking - False
Social engineering - False
Brute force - False
An intruder sending email messages that appear to be coming from a system administrator is an example of a _____ attack.
Spoofing - True
Brute force - False
Cracking - False
Packet sniffing - False
Which of the following means of providing password information to Internet Service Providers is (are) considered safe?
Phone
Email
None - True
I only - False
II only - False
I and II - False
Unencrypted information is referred to as
Plaintext - True
Ciphertext - False
Key - False
Key space - False
The set of all possible keys for an encryption algorithm is known as its
Key space - True
Cryptography factor - False
Cipher count - False
Brute force - False
Which of the following is (are) true regarding smart card chips used for authentication?