100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSCI 4200 - FINAL REVIEW || Questions and 100% Verified Answers. $13.79   Add to cart

Exam (elaborations)

CSCI 4200 - FINAL REVIEW || Questions and 100% Verified Answers.

 3 views  0 purchase
  • Course
  • CSCI 4200
  • Institution
  • CSCI 4200

Service pack is the term given to a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks. correct answers False Generael UNIX baselining follows similar concepts as baselining for Windows OSs. correct answers...

[Show more]

Preview 3 out of 25  pages

  • August 23, 2024
  • 25
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSCI 4200
  • CSCI 4200
avatar-seller
FullyFocus
CSCI 4200 - FINAL REVIEW || Questions and 100%
Verified Answers.
Service pack is the term given to a small software update designed to address a specific problem,
such as a buffer overflow in an application that exposes the system to attacks. correct answers
False

Generael UNIX baselining follows similar concepts as baselining for Windows OSs. correct
answers True

Windows Defender is now standard with all versions of the Windows desktop operating systems.
correct answers True

Protecting data while in use is a much trickier proposition than protecting it in transsit or in
storage. correct answers True

Snapshots are instantaneous save points in time on virtual machines. correct answers True

What term refers to the process of establishing a system's operational state?
A. Hardening
B. Baselining
C. Securing
D. Controlling correct answers Baselining

Which protection ring has the highest privilege level and acts directly with the physical
hardware?
A. Ring 0
B. Ring 1
C. Ring 2
D. Ring 3 correct answers Ring 0

The security kernel is also known as a ________.
A. Baseline monitor
B. Reference monitor
C. Baseline reference
D. Secure monitor correct answers Reference monitor

Which term refers to the quarantine or isolation of a system from its surroundings?
A. Demilitarized zoning
B. Read-only domain controller pruning
C. Egress filtering
D. Sandboxing correct answers Sandboxing

Windows Server 2016 replaced the traditional ROM-BIOS with the _________.
A. ELAM Boot

,B. Secure Boot
C. Unified Extensible Firmware Interface (UEFI)
D. Trusted Machine Platform correct answers Unified Extensible Firmware Interface (UEFI)

In a UNIX operating system, which runlevel reboots the machine?
A. 0
B. 1
C. 3
D. 6 correct answers 6

What command stops a service in UNIX?
A. Stop
B. Kill
C. End
D. Finish correct answers Kill

Which product filters out junk e-mail?
A. Intrusion dectection system
B. Personal firewall
C. Antispam
D. Antivirus correct answers Antispam

______ tehcnologies involve the miniaturization of the various circuits needed for a working
computer system.
A. TCP wrappers
B. System on a Chip (SoC)
C. Daemon
D. Supervisory control and data acquisition (SCADA) correct answers System on a Chip (SoC)

Perpetrating some sort of electronic fraud is one reason a specific system might be targeted for
attack. correct answers True

Targeted attacks are easier and take less time and effort than attacks on targets of opportunty.
correct answers False

Vulnerabilities are exploited by attackers to gain access to a system. correct answers True

Defense against attack begins by eliminating threats. correct answers False

A worm is malicious code that has to attach itself to something else to survive. correct answers
False

A birthday attack is a type of logic bomb virus that releases its payload on some famous person's
birthday, such as Michelangelo. correct answers False

, Shimming is the process of putting a layer of code between the driver and the operating system.
correct answers True

The term _______ refers to software that has been designed for some nefarious purpose.
A. Virus
B. Worm
C. Trojan horse
D. Malware correct answers Malware

What kind of an attack involves a piece of software that appears to do one thing (and may, in
fact, actually do that thing), but hides some other functionality?
A. Logic bomb
B. Hoax
C. Trojan
D. Worm correct answers Trojan

Which term refers to a form of malware that is specifically designed to modify the operation of
the operating system in some fashion to facilitate nonstandard functionality?
A. Rootkit
B. Boot sector virus
C. Spyware
D. Dieware correct answers Rootkit

What term refers to a piece of code that sits dormant for a period of time until some event
invokes its malicious payload?
A. Trojan
B. Logic bomb
C. Trigger virus
D. Logic worm correct answers Logic bomb

What type of software records and reports activities of the user (typically without their
knowledge)?
A. Ransomware
B. Malware
C. Spyware
D. Trojan correct answers Spyware

SYN flooding is an example of a ________.
A. Viral attack
B. Denial-of-service attack
C. Logic bomb
D. Trojan horse correct answers Denial-of-service attack

What term refers to an attacker's attempt to discover unprotected modem connections to
computer systems and networks?
A. Software exploitation

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.79. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78600 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.79
  • (0)
  Add to cart