Which of the following is not one of the three major classes of threats?
A computer virus or worm
Denial of Service attacks
Actually intruding on a system
Online auction fraud - answer-Online auction fraud
Those who exploit systems for harm such as to erase files, change data, or defa...
Those who exploit systems for harm such as to erase files, change data, or deface Web sites are typically
called:
gray hat hackers
red hat hackers
black hat hackers
white hat hackers - answer-black hat hackers
Which of the following is the best definition for non-repudiation?
It is another term for user authentication.
Access control
Processes that verify which user performs what action.
Security that does not allow the potential intruder to deny his attack - answer-Processes that verify
which user performs what action
Which of the following is the most accurate definition of a virus?
Any program that can damage your system
Any program that self replicates
Any program that carries a malicious payload
Any program that spreads via email. - answer-Any program that self replicates
,An intrusion-detection system is an example of:
Hybrid security
Good security practices
Proactive security
Perimeter security - answer-Proactive security
In addition to mandating federal agencies to establish security measures, the Computer Security Act of
1987 defined important terms such as:
private information
security information
sensitive information
unauthorized access - answer-sensitive information
Which of the following is the best definition of malware?
Software that self replicates
Any software that is not properly configured for your system
Software that damages your system
Software that has some malicious purpose - answer-Software that has some malicious purpose
What is the term for hacking a phone system?
phreaking
Telco-hacking
Hacking
Cracking - answer-phreaking
Encryption and virtual private networks are techniques used to secure which of the following?
Data
Firewalls
Proxy servers
,Connection points - answer-Data
What are the three approaches to security?
High security, medium security, and low security
Perimeter, complete, and none
Internal, external, and hybrid
Perimeter, layered, and hybrid - answer-Perimeter, layered, and hybrid
Which of the following is the best definition for war-driving?
Driving while using a wireless connection to hack
Driving while hacking and seeking a computer job
Driving looking for wireless networks to hack
Driving and seeking rival hackers - answer-Driving looking for wireless networks to hack
Are there any reasons not to take an extreme view of security, if that view errs on the side of caution?
Yes, if you are going to err, assume there are few if any realistic threats.
No, there is no reason not to take such an extreme view.
Yes, that can lead to wasting resources on threats that are not likely.
Yes, that can require that you increase your security skills in order to implement more rigorous
defenses. - answer-Yes, that can lead to wasting resources on threats that are not likely.
The process of reviewing logs, records, and procedures to determine whether they meet appropriate
standards is called:
sneaking
filtering
auditing
authenticating - answer-auditing
Which approach to security is proactive in addressing potential threats before they occur?
Install a virus on the target machine - answer-Prevent legitimate users from accessing a system
Which term is generally used by hackers to refer to attempts at intrusion into a system without
permission and usually for malevolent purposes?
Blocking
Social engineering.
Cracking
Hacking - answer-Cracking
Which of the following is the best definition for the term sneaker?
An amateur who hacks a system without being caught
A person who hacks a system to test its vulnerabilities
A person who hacks a system by faking a legitimate password
An amateur hacke - answer-A person who hacks a system to test its vulnerabilities
Which of the following is the best definition of "sensitive information"?
Any information that has monetary value and is protected by any privacy laws
Any information that is worth more thatn $1,000
Military or defense related information
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TOPDOCTOR. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.