Deck 11: Security and Ethics

ملء الشاشة (f)
exit full mode
سؤال
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When nonsynchronized processes access data records and modify some but not all of a record's fields,it is called "accidental incomplete modification of data."
سؤال
The IEEE and the Association for Computing Machinery (ACM)issued a standard of ethics for the global computing community in 1977.
سؤال
Partial network encryption,also called communications encryption,is the most extreme form of encryption.
سؤال
A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.
سؤال
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.
سؤال
Some viruses are considered to be benign.
سؤال
A firewall typically sits between a network and its individual computers.
سؤال
A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.
سؤال
A gap in system security in always indicative of malicious activity.
سؤال
A virus is defined as a small program written to alter the way a computer operates,without the permission or knowledge of the user.
سؤال
A macro virus infects data files,such as word processing documents and spread sheets,though newer versions now infect other program files as well.
سؤال
A master boot record virus infects both the boot record and program files,making them especially difficult to repair.
سؤال
Wiretapping involves the capability of authorized users to search through storage,directories,or files for private information.
سؤال
Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
سؤال
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.
سؤال
One popular authentication tool is Kerberos,a network authentication protocol developed as part of the Athena Project at MIT.
سؤال
In public/private key encryption,the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
سؤال
Any vulnerability at the operating system level opens the entire system to attack.
سؤال
If a password consists of ten characters,it would take a human about 4.5 years to guess the password if the human makes one try each second.
سؤال
Generally,____ antivirus software compares file sizes (checking for added code when none is expected),looks for replicating instructions,and searches for unusual file activity.

A) diagnostic
B) preventive
C) reactive
D) firewall
سؤال
The immediate result of a worm is ____.

A) not noticeable until later
B) the slower processing time of legitimate work
C) complete data loss with little chance of recovery
D) a computer crash with or without a blue screen
سؤال
A ____ combines into one program the characteristics of other attacks.

A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat
سؤال
What configuration has the highest level of risk?

A) LAN with Internet
B) LAN without Internet
C) Single computer without e-mail or Internet
D) LAN with firewall
سؤال
The object used by the Kerberos protocol to provide client verification is known as a ____.

A) password
B) passphrase
C) token
D) ticket
سؤال
Two methods of active wiretapping are "between lines transmission" and "____."

A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors
سؤال
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

A) worm
B) masquerade program
C) Trojan horse
D) virtual login console
سؤال
What strategy contributes most to system recovery?

A) authentication
B) integrity checking
C) data replication
D) encryption
سؤال
____ peruse data packets as they pass by,examine each one for specific information,and log copies of interesting packets for more detailed examination.

A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters
سؤال
A ____ server hides important network information from outsiders by making the network server invisible.

A) redirection
B) blocking
C) proxy
D) fire
سؤال
The capability of a system to fulfill its mission,in a timely manner,in the presence of attacks,failures,or accidents is known as ____.

A) attack resistance
B) attack survivability
C) system recovery
D) system survivability
سؤال
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A) Spoofing
B) Phishing
C) Impersonating
D) Acting
سؤال
Using ____,a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address,destination address,and protocol are all correct.

A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software
سؤال
One major disadvantage of encryption is that ____.

A) it increases the system's overhead
B) it is inconvenient for users
C) it is prohibitive in cost
D) it is often ineffective
سؤال
Trash collection,also known as ____,is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.

A) dumpster diving
B) digital recycling
C) dumpster surfing
D) trash surfing
سؤال
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there.This issue is an example of a(n)____.

A) unintentional attack
B) malicious attack
C) denial-of-service attack
D) trap door attack
سؤال
An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n)____ backup.

A) incremental
B) layered
C) phased
D) recovery-based
سؤال
It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.

A) .008788 seconds
B) 4.5 seconds
C) 2.5 hours
D) 58 hours
سؤال
____ viruses infect data files.

A) File infector
B) Boot sector
C) Master boot record
D) Macro
سؤال
____ involve the use of graphics and a pattern of clicks using a touch screen,mouse,or other pointing device.

A) Picture passwords
B) fingerprint scanner
C) biometric scanner
D) retina scanner
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Security and Ethics
1
Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.
True
2
When nonsynchronized processes access data records and modify some but not all of a record's fields,it is called "accidental incomplete modification of data."
True
3
The IEEE and the Association for Computing Machinery (ACM)issued a standard of ethics for the global computing community in 1977.
False
4
Partial network encryption,also called communications encryption,is the most extreme form of encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
Some viruses are considered to be benign.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
A firewall typically sits between a network and its individual computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
A worm is a memory-resident program that copies itself from one system to the next without requiring the aid of an infected program file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
A gap in system security in always indicative of malicious activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
A virus is defined as a small program written to alter the way a computer operates,without the permission or knowledge of the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
A macro virus infects data files,such as word processing documents and spread sheets,though newer versions now infect other program files as well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
A master boot record virus infects both the boot record and program files,making them especially difficult to repair.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
Wiretapping involves the capability of authorized users to search through storage,directories,or files for private information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
Intrusion detection is an example of a strategy for improving system survivability based on knowledge gained from intrusions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
One popular authentication tool is Kerberos,a network authentication protocol developed as part of the Athena Project at MIT.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
In public/private key encryption,the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
Any vulnerability at the operating system level opens the entire system to attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
If a password consists of ten characters,it would take a human about 4.5 years to guess the password if the human makes one try each second.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Generally,____ antivirus software compares file sizes (checking for added code when none is expected),looks for replicating instructions,and searches for unusual file activity.

A) diagnostic
B) preventive
C) reactive
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
The immediate result of a worm is ____.

A) not noticeable until later
B) the slower processing time of legitimate work
C) complete data loss with little chance of recovery
D) a computer crash with or without a blue screen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ____ combines into one program the characteristics of other attacks.

A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
What configuration has the highest level of risk?

A) LAN with Internet
B) LAN without Internet
C) Single computer without e-mail or Internet
D) LAN with firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
The object used by the Kerberos protocol to provide client verification is known as a ____.

A) password
B) passphrase
C) token
D) ticket
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Two methods of active wiretapping are "between lines transmission" and "____."

A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

A) worm
B) masquerade program
C) Trojan horse
D) virtual login console
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
What strategy contributes most to system recovery?

A) authentication
B) integrity checking
C) data replication
D) encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
____ peruse data packets as they pass by,examine each one for specific information,and log copies of interesting packets for more detailed examination.

A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
A ____ server hides important network information from outsiders by making the network server invisible.

A) redirection
B) blocking
C) proxy
D) fire
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
The capability of a system to fulfill its mission,in a timely manner,in the presence of attacks,failures,or accidents is known as ____.

A) attack resistance
B) attack survivability
C) system recovery
D) system survivability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A) Spoofing
B) Phishing
C) Impersonating
D) Acting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Using ____,a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address,destination address,and protocol are all correct.

A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
One major disadvantage of encryption is that ____.

A) it increases the system's overhead
B) it is inconvenient for users
C) it is prohibitive in cost
D) it is often ineffective
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Trash collection,also known as ____,is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.

A) dumpster diving
B) digital recycling
C) dumpster surfing
D) trash surfing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there.This issue is an example of a(n)____.

A) unintentional attack
B) malicious attack
C) denial-of-service attack
D) trap door attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n)____ backup.

A) incremental
B) layered
C) phased
D) recovery-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.

A) .008788 seconds
B) 4.5 seconds
C) 2.5 hours
D) 58 hours
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
____ viruses infect data files.

A) File infector
B) Boot sector
C) Master boot record
D) Macro
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
____ involve the use of graphics and a pattern of clicks using a touch screen,mouse,or other pointing device.

A) Picture passwords
B) fingerprint scanner
C) biometric scanner
D) retina scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.