SCIA 360 Chapter 11

Description

SCIA 360 Flashcards on SCIA 360 Chapter 11, created by Tyler Rock on 23/04/2019.
Tyler Rock
Flashcards by Tyler Rock, updated more than 1 year ago
Tyler Rock
Created by Tyler Rock over 6 years ago
41
0

Resource summary

Question Answer
The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____. a. attack resistance b. attack survivability c. system recovery d. system survivability d. system survivability
What strategy contributes most to system recovery? a. authentication b. integrity checking c. data replication d. encryption c. data replication
What configuration has the highest level of risk? a. LAN with Internet b. LAN without Internet c. Single computer without e-mail or Internet d. LAN with firewall a. LAN with Internet
An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup. a. incremental b. layered c. phased d. recovery-based b. layered
Errors can occur when data values are incorrectly stored because the field isn’t large enough to hold the numeric value stored there. This issue is an example of a(n) ____. a. unintentional attack b. malicious attack c. denial-of-service attack d. trap door attack a. unintentional attack
Two methods of active wiretapping are “between lines transmission” and “____.” a. Trojan horse b. piggyback entry c. browsing d. trap doors b. piggyback entry
It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second. a. .008788 seconds b. 4.5 seconds c. 2.5 hours d. 58 hours a. .008788 seconds
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users. a. dumpster diving b. digital recycling c. dumpster surfing d. trash surfing a. dumpster diving
____ viruses infect data files. a. File infector b. Boot sector c. Master boot record d. Macro d. Macro
The immediate result of a worm is ____. a. not noticeable until later b. the slower processing time of legitimate work c. complete data loss with little chance of recovery d. a computer crash with or without a blue screen b. the slower processing time of legitimate work
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes. a. worm b. masquerade program c. Trojan horse d. virtual login console c. Trojan horse
Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity. a. diagnostic b. preventive c. reactive d. firewall a. diagnostic
A ____ combines into one program the characteristics of other attacks. a. Trojan Horse b. worm c. multi-thread virus d. blended threat d. blended threat
Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct. a. snooping b. packet filtering c. a proxy server d. anti-virus software b. packet filtering
A ____ server hides important network information from outsiders by making the network server invisible. a. redirection b. blocking c. proxy d. fire c. proxy
The object used by the Kerberos protocol to provide client verification is known as a ____. a. password b. passphrase c. token d. ticket d. ticket
One major disadvantage of encryption is that ____. a. it increases the system’s overhead b. it is inconvenient for users c. it is prohibitive in cost d. it is often ineffective a. it increases the system’s overhead
____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination. a. Spoofers b. Proxy servers c. Packet sniffers d. Packet filters c. Packet sniffers
____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device. a. Picture passwords b. fingerprint scanner c. biometric scanner d. retina scanner a. Picture passwords
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information. a. Spoofing b. Phishing c. Impersonating d. Acting b. Phishing
Show full summary Hide full summary

Similar

Hygiene Test 2- PMU
Med Student
Epidemiology Test 2- 5th Year PMU
Med Student
Opthamology Test 2- 4th Year- PMU
Med Student
Windows Client - Test 2
s-blossom05
Labor Econ
Joshua Warner
Test 1
kpopcollege
Weed ID exam 2 9/14/18
Glen Childers
Toets proef
m.hoevers
Logistics Test 2
remy.richman
SCIA 470 Chapter 6
Tyler Rock