|
|
Created by Tyler Rock
over 6 years ago
|
|
| Question | Answer |
| The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____. a. attack resistance b. attack survivability c. system recovery d. system survivability | d. system survivability |
| What strategy contributes most to system recovery? a. authentication b. integrity checking c. data replication d. encryption | c. data replication |
| What configuration has the highest level of risk? a. LAN with Internet b. LAN without Internet c. Single computer without e-mail or Internet d. LAN with firewall | a. LAN with Internet |
| An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup. a. incremental b. layered c. phased d. recovery-based | b. layered |
| Errors can occur when data values are incorrectly stored because the field isn’t large enough to hold the numeric value stored there. This issue is an example of a(n) ____. a. unintentional attack b. malicious attack c. denial-of-service attack d. trap door attack | a. unintentional attack |
| Two methods of active wiretapping are “between lines transmission” and “____.” a. Trojan horse b. piggyback entry c. browsing d. trap doors | b. piggyback entry |
| It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. a. .008788 seconds b. 4.5 seconds c. 2.5 hours d. 58 hours | a. .008788 seconds |
| Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. a. dumpster diving b. digital recycling c. dumpster surfing d. trash surfing | a. dumpster diving |
| ____ viruses infect data files. a. File infector b. Boot sector c. Master boot record d. Macro | d. Macro |
| The immediate result of a worm is ____. a. not noticeable until later b. the slower processing time of legitimate work c. complete data loss with little chance of recovery d. a computer crash with or without a blue screen | b. the slower processing time of legitimate work |
| Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes. a. worm b. masquerade program c. Trojan horse d. virtual login console | c. Trojan horse |
| Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity. a. diagnostic b. preventive c. reactive d. firewall | a. diagnostic |
| A ____ combines into one program the characteristics of other attacks. a. Trojan Horse b. worm c. multi-thread virus d. blended threat | d. blended threat |
| Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct. a. snooping b. packet filtering c. a proxy server d. anti-virus software | b. packet filtering |
| A ____ server hides important network information from outsiders by making the network server invisible. a. redirection b. blocking c. proxy d. fire | c. proxy |
| The object used by the Kerberos protocol to provide client verification is known as a ____. a. password b. passphrase c. token d. ticket | d. ticket |
| One major disadvantage of encryption is that ____. a. it increases the system’s overhead b. it is inconvenient for users c. it is prohibitive in cost d. it is often ineffective | a. it increases the system’s overhead |
| ____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. a. Spoofers b. Proxy servers c. Packet sniffers d. Packet filters | c. Packet sniffers |
| ____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device. a. Picture passwords b. fingerprint scanner c. biometric scanner d. retina scanner | a. Picture passwords |
| ____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. a. Spoofing b. Phishing c. Impersonating d. Acting | b. Phishing |
Want to create your own Flashcards for free with GoConqr? Learn more.