Which of the following is not one of the three major classes of threats?
A computer virus or worm
Denial of Service attacks
Actually intruding on a system
Online auction fraud - answer-Online auction fraud
Those who exploit systems for harm such as to erase files, change data, or defa...
Those who exploit systems for harm such as to erase files, change data, or deface Web sites are typically
called:
gray hat hackers
red hat hackers
black hat hackers
white hat hackers - answer-black hat hackers
Which of the following is the best definition for non-repudiation?
It is another term for user authentication.
Access control
Processes that verify which user performs what action.
Security that does not allow the potential intruder to deny his attack - answer-Processes that verify
which user performs what action
Which of the following is the most accurate definition of a virus?
Any program that can damage your system
Any program that self replicates
Any program that carries a malicious payload
Any program that spreads via email. - answer-Any program that self replicates
,An intrusion-detection system is an example of:
Hybrid security
Good security practices
Proactive security
Perimeter security - answer-Proactive security
In addition to mandating federal agencies to establish security measures, the Computer Security Act of
1987 defined important terms such as:
private information
security information
sensitive information
unauthorized access - answer-sensitive information
Which of the following is the best definition of malware?
Software that self replicates
Any software that is not properly configured for your system
Software that damages your system
Software that has some malicious purpose - answer-Software that has some malicious purpose
What is the term for hacking a phone system?
phreaking
Telco-hacking
Hacking
Cracking - answer-phreaking
Encryption and virtual private networks are techniques used to secure which of the following?
Data
Firewalls
Proxy servers
,Connection points - answer-Data
What are the three approaches to security?
High security, medium security, and low security
Perimeter, complete, and none
Internal, external, and hybrid
Perimeter, layered, and hybrid - answer-Perimeter, layered, and hybrid
Which of the following is the best definition for war-driving?
Driving while using a wireless connection to hack
Driving while hacking and seeking a computer job
Driving looking for wireless networks to hack
Driving and seeking rival hackers - answer-Driving looking for wireless networks to hack
Are there any reasons not to take an extreme view of security, if that view errs on the side of caution?
Yes, if you are going to err, assume there are few if any realistic threats.
No, there is no reason not to take such an extreme view.
Yes, that can lead to wasting resources on threats that are not likely.
Yes, that can require that you increase your security skills in order to implement more rigorous
defenses. - answer-Yes, that can lead to wasting resources on threats that are not likely.
The process of reviewing logs, records, and procedures to determine whether they meet appropriate
standards is called:
sneaking
filtering
auditing
authenticating - answer-auditing
Which approach to security is proactive in addressing potential threats before they occur?
Install a virus on the target machine - answer-Prevent legitimate users from accessing a system
Which term is generally used by hackers to refer to attempts at intrusion into a system without
permission and usually for malevolent purposes?
Blocking
Social engineering.
Cracking
Hacking - answer-Cracking
Which of the following is the best definition for the term sneaker?
An amateur who hacks a system without being caught
A person who hacks a system to test its vulnerabilities
A person who hacks a system by faking a legitimate password
An amateur hacke - answer-A person who hacks a system to test its vulnerabilities
Which of the following is the best definition of "sensitive information"?
Any information that has monetary value and is protected by any privacy laws
Any information that is worth more thatn $1,000
Military or defense related information
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur TOPDOCTOR. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €13,73. Vous n'êtes lié à rien après votre achat.