Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
Intro to IA Mid Term study guide multiple choice €13,73   Ajouter au panier

Examen

Intro to IA Mid Term study guide multiple choice

 0 vue  0 fois vendu
  • Cours
  • Intro to IA
  • Établissement
  • Intro To IA

Which of the following is not one of the three major classes of threats? A computer virus or worm Denial of Service attacks Actually intruding on a system Online auction fraud - answer-Online auction fraud Those who exploit systems for harm such as to erase files, change data, or defa...

[Montrer plus]

Aperçu 4 sur 33  pages

  • 30 septembre 2024
  • 33
  • 2024/2025
  • Examen
  • Questions et réponses
  • Intro to IA
  • Intro to IA
avatar-seller
Intro to IA Mid Term study guide multiple choice

Which of the following is not one of the three major classes of threats?

A computer virus or worm

Denial of Service attacks

Actually intruding on a system

Online auction fraud - answer-Online auction fraud



Those who exploit systems for harm such as to erase files, change data, or deface Web sites are typically
called:

gray hat hackers

red hat hackers

black hat hackers

white hat hackers - answer-black hat hackers



Which of the following is the best definition for non-repudiation?

It is another term for user authentication.

Access control

Processes that verify which user performs what action.

Security that does not allow the potential intruder to deny his attack - answer-Processes that verify
which user performs what action



Which of the following is the most accurate definition of a virus?

Any program that can damage your system

Any program that self replicates

Any program that carries a malicious payload

Any program that spreads via email. - answer-Any program that self replicates

,An intrusion-detection system is an example of:

Hybrid security

Good security practices

Proactive security

Perimeter security - answer-Proactive security



In addition to mandating federal agencies to establish security measures, the Computer Security Act of
1987 defined important terms such as:

private information

security information

sensitive information

unauthorized access - answer-sensitive information



Which of the following is the best definition of malware?

Software that self replicates

Any software that is not properly configured for your system

Software that damages your system

Software that has some malicious purpose - answer-Software that has some malicious purpose



What is the term for hacking a phone system?

phreaking

Telco-hacking

Hacking

Cracking - answer-phreaking



Encryption and virtual private networks are techniques used to secure which of the following?

Data

Firewalls

Proxy servers

,Connection points - answer-Data



What are the three approaches to security?

High security, medium security, and low security

Perimeter, complete, and none

Internal, external, and hybrid

Perimeter, layered, and hybrid - answer-Perimeter, layered, and hybrid



Which of the following is the best definition for war-driving?

Driving while using a wireless connection to hack

Driving while hacking and seeking a computer job

Driving looking for wireless networks to hack

Driving and seeking rival hackers - answer-Driving looking for wireless networks to hack



Are there any reasons not to take an extreme view of security, if that view errs on the side of caution?

Yes, if you are going to err, assume there are few if any realistic threats.

No, there is no reason not to take such an extreme view.

Yes, that can lead to wasting resources on threats that are not likely.

Yes, that can require that you increase your security skills in order to implement more rigorous
defenses. - answer-Yes, that can lead to wasting resources on threats that are not likely.



The process of reviewing logs, records, and procedures to determine whether they meet appropriate
standards is called:

sneaking

filtering

auditing

authenticating - answer-auditing



Which approach to security is proactive in addressing potential threats before they occur?

, Passive security approach

Layered security approach

Hybrid security approach

Dynamic security approach - answer-Dynamic security approach



Blocking attacks seek to accomplish what?

Shut down security measures

Prevent legitimate users from accessing a system

Break into a target system

Install a virus on the target machine - answer-Prevent legitimate users from accessing a system



Which term is generally used by hackers to refer to attempts at intrusion into a system without
permission and usually for malevolent purposes?

Blocking

Social engineering.

Cracking

Hacking - answer-Cracking



Which of the following is the best definition for the term sneaker?

An amateur who hacks a system without being caught

A person who hacks a system to test its vulnerabilities

A person who hacks a system by faking a legitimate password

An amateur hacke - answer-A person who hacks a system to test its vulnerabilities



Which of the following is the best definition of "sensitive information"?

Any information that has monetary value and is protected by any privacy laws

Any information that is worth more thatn $1,000

Military or defense related information

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur TOPDOCTOR. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour €13,73. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

85443 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!
€13,73
  • (0)
  Ajouter