CSCI 4200 - FINAL REVIEW || Questions and 100% Verified Answers.
3 views 0 purchase
Course
CSCI 4200
Institution
CSCI 4200
Service pack is the term given to a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks. correct answers False
Generael UNIX baselining follows similar concepts as baselining for Windows OSs. correct answers...
CSCI 4200 - FINAL REVIEW || Questions and 100%
Verified Answers.
Service pack is the term given to a small software update designed to address a specific problem,
such as a buffer overflow in an application that exposes the system to attacks. correct answers
False
Generael UNIX baselining follows similar concepts as baselining for Windows OSs. correct
answers True
Windows Defender is now standard with all versions of the Windows desktop operating systems.
correct answers True
Protecting data while in use is a much trickier proposition than protecting it in transsit or in
storage. correct answers True
Snapshots are instantaneous save points in time on virtual machines. correct answers True
What term refers to the process of establishing a system's operational state?
A. Hardening
B. Baselining
C. Securing
D. Controlling correct answers Baselining
Which protection ring has the highest privilege level and acts directly with the physical
hardware?
A. Ring 0
B. Ring 1
C. Ring 2
D. Ring 3 correct answers Ring 0
The security kernel is also known as a ________.
A. Baseline monitor
B. Reference monitor
C. Baseline reference
D. Secure monitor correct answers Reference monitor
Which term refers to the quarantine or isolation of a system from its surroundings?
A. Demilitarized zoning
B. Read-only domain controller pruning
C. Egress filtering
D. Sandboxing correct answers Sandboxing
Windows Server 2016 replaced the traditional ROM-BIOS with the _________.
A. ELAM Boot
,B. Secure Boot
C. Unified Extensible Firmware Interface (UEFI)
D. Trusted Machine Platform correct answers Unified Extensible Firmware Interface (UEFI)
In a UNIX operating system, which runlevel reboots the machine?
A. 0
B. 1
C. 3
D. 6 correct answers 6
What command stops a service in UNIX?
A. Stop
B. Kill
C. End
D. Finish correct answers Kill
Which product filters out junk e-mail?
A. Intrusion dectection system
B. Personal firewall
C. Antispam
D. Antivirus correct answers Antispam
______ tehcnologies involve the miniaturization of the various circuits needed for a working
computer system.
A. TCP wrappers
B. System on a Chip (SoC)
C. Daemon
D. Supervisory control and data acquisition (SCADA) correct answers System on a Chip (SoC)
Perpetrating some sort of electronic fraud is one reason a specific system might be targeted for
attack. correct answers True
Targeted attacks are easier and take less time and effort than attacks on targets of opportunty.
correct answers False
Vulnerabilities are exploited by attackers to gain access to a system. correct answers True
Defense against attack begins by eliminating threats. correct answers False
A worm is malicious code that has to attach itself to something else to survive. correct answers
False
A birthday attack is a type of logic bomb virus that releases its payload on some famous person's
birthday, such as Michelangelo. correct answers False
, Shimming is the process of putting a layer of code between the driver and the operating system.
correct answers True
The term _______ refers to software that has been designed for some nefarious purpose.
A. Virus
B. Worm
C. Trojan horse
D. Malware correct answers Malware
What kind of an attack involves a piece of software that appears to do one thing (and may, in
fact, actually do that thing), but hides some other functionality?
A. Logic bomb
B. Hoax
C. Trojan
D. Worm correct answers Trojan
Which term refers to a form of malware that is specifically designed to modify the operation of
the operating system in some fashion to facilitate nonstandard functionality?
A. Rootkit
B. Boot sector virus
C. Spyware
D. Dieware correct answers Rootkit
What term refers to a piece of code that sits dormant for a period of time until some event
invokes its malicious payload?
A. Trojan
B. Logic bomb
C. Trigger virus
D. Logic worm correct answers Logic bomb
What type of software records and reports activities of the user (typically without their
knowledge)?
A. Ransomware
B. Malware
C. Spyware
D. Trojan correct answers Spyware
SYN flooding is an example of a ________.
A. Viral attack
B. Denial-of-service attack
C. Logic bomb
D. Trojan horse correct answers Denial-of-service attack
What term refers to an attacker's attempt to discover unprotected modem connections to
computer systems and networks?
A. Software exploitation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.79. You're not tied to anything after your purchase.