Filters
Question type

Study Flashcards

Defacing a Web server, running a packet sniffer on a workstation to capture user names and passwords, viewing sensitive data without authorization, and copying a database containing credit card numbers, are all examples of _________ .

Correct Answer

verifed

verified

_________ can occur either by means of malicious logic or a hacker that has gained unauthorized access to a system.


A) Misuse
B) Misappropriation
C) Interception
D) Repudiation

Correct Answer

verifed

verified

Three key objectives of computer security are: confidentiality, availability, and _________ .

Correct Answer

verifed

verified

Traditionally, those who hack into computers do so for the thrill of it or for status.

Correct Answer

verifed

verified

A _________ is a program that can replicate itself and send copies from computer to computer across network connections.


A) zombie
B) bot
C) flooder
D) worm

Correct Answer

verifed

verified

D

_________ assures that private or confidential information is not made available or disclosed to unauthorized individuals.


A) Privacy
B) Availability
C) Data confidentiality
D) Integrity

Correct Answer

verifed

verified

_________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.

Correct Answer

verifed

verified

Insider attacks are among the easiest to detect and prevent.

Correct Answer

verifed

verified

A loss of _________ is the disruption of access to, or use of, information or an information system.


A) integrity
B) confidentiality
C) availability
D) authenticity

Correct Answer

verifed

verified

One way to obstruct system operation is to overload the system by placing excess burden on communication traffic or processing resources.

Correct Answer

verifed

verified

A __________ is a secret entry point into a program that allows someone who is aware of it to gain access without going through the usual security access procedures.

Correct Answer

verifed

verified

backdoor (...

View Answer

_________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.


A) Data confidentiality
B) System integrity
C) Privacy
D) Data integrity

Correct Answer

verifed

verified

B

Nimda has worm, virus, and mobile code characteristics.

Correct Answer

verifed

verified

A computer _________ is a piece of software that can "infect" other programs by modifying them; the modification includes injecting the original program with a routine to make copies of itself, which can then go on to infect other programs.

Correct Answer

verifed

verified

virus

__________ assures that information and programs are changed only in a specified and authorized manner.

Correct Answer

verifed

verified

An example of _________ is known as traffic analysis, in which an adversary is able to gain information from observing the pattern of traffic on a network.


A) intrusion
B) exposure
C) interception
D) inference

Correct Answer

verifed

verified

A _________ captures keystrokes on the infected machine.


A) keylogger
B) rootkit
C) scanner
D) sniffer

Correct Answer

verifed

verified

Deception is a threat to availability or system integrity.

Correct Answer

verifed

verified

A __________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.

Correct Answer

verifed

verified

Hardware is the most vulnerable to attack and the least susceptible to automated controls.

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer