Which of the following is not one of the three major classes of threats?
A computer virus or worm
Denial of Service attacks
Actually intruding on a system
Online auction fraud - answer-Online auction fraud
Those who exploit systems for harm such as to erase files, change data, or defa...
Those who exploit systems for harm such as to erase files, change data, or deface Web sites are typically
called:
gray hat hackers
red hat hackers
black hat hackers
white hat hackers - answer-black hat hackers
Which of the following is the best definition for non-repudiation?
It is another term for user authentication.
Access control
Processes that verify which user performs what action.
Security that does not allow the potential intruder to deny his attack - answer-Processes that verify
which user performs what action
Which of the following is the most accurate definition of a virus?
Any program that can damage your system
Any program that self replicates
Any program that carries a malicious payload
Any program that spreads via email. - answer-Any program that self replicates
,An intrusion-detection system is an example of:
Hybrid security
Good security practices
Proactive security
Perimeter security - answer-Proactive security
In addition to mandating federal agencies to establish security measures, the Computer Security Act of
1987 defined important terms such as:
private information
security information
sensitive information
unauthorized access - answer-sensitive information
Which of the following is the best definition of malware?
Software that self replicates
Any software that is not properly configured for your system
Software that damages your system
Software that has some malicious purpose - answer-Software that has some malicious purpose
What is the term for hacking a phone system?
phreaking
Telco-hacking
Hacking
Cracking - answer-phreaking
Encryption and virtual private networks are techniques used to secure which of the following?
Data
Firewalls
Proxy servers
,Connection points - answer-Data
What are the three approaches to security?
High security, medium security, and low security
Perimeter, complete, and none
Internal, external, and hybrid
Perimeter, layered, and hybrid - answer-Perimeter, layered, and hybrid
Which of the following is the best definition for war-driving?
Driving while using a wireless connection to hack
Driving while hacking and seeking a computer job
Driving looking for wireless networks to hack
Driving and seeking rival hackers - answer-Driving looking for wireless networks to hack
Are there any reasons not to take an extreme view of security, if that view errs on the side of caution?
Yes, if you are going to err, assume there are few if any realistic threats.
No, there is no reason not to take such an extreme view.
Yes, that can lead to wasting resources on threats that are not likely.
Yes, that can require that you increase your security skills in order to implement more rigorous
defenses. - answer-Yes, that can lead to wasting resources on threats that are not likely.
The process of reviewing logs, records, and procedures to determine whether they meet appropriate
standards is called:
sneaking
filtering
auditing
authenticating - answer-auditing
Which approach to security is proactive in addressing potential threats before they occur?
Install a virus on the target machine - answer-Prevent legitimate users from accessing a system
Which term is generally used by hackers to refer to attempts at intrusion into a system without
permission and usually for malevolent purposes?
Blocking
Social engineering.
Cracking
Hacking - answer-Cracking
Which of the following is the best definition for the term sneaker?
An amateur who hacks a system without being caught
A person who hacks a system to test its vulnerabilities
A person who hacks a system by faking a legitimate password
An amateur hacke - answer-A person who hacks a system to test its vulnerabilities
Which of the following is the best definition of "sensitive information"?
Any information that has monetary value and is protected by any privacy laws
Any information that is worth more thatn $1,000
Military or defense related information
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper TOPDOCTOR. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €13,74. Je zit daarna nergens aan vast.