Deck 7: Computer and Network Security

ملء الشاشة (f)
exit full mode
سؤال
You may find a virus

A) on a hard disk.
B) on a floppy disk.
C) on a CD-ROM.
D) in an email attachment.
E) All of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An intentional action designed to prevent legitimate users from making use of a computer service is called

A) a bombing run.
B) a curtain closer.
C) a denial-of-service attack.
D) an electronic overdose.
E) phreaking.
سؤال
A software program that responds to commands sent by a command-and-control program located on an external computer is called a

A) bot.
B) spoof.
C) vampire.
D) virus.
E) worm.
سؤال
A piece of self-replicating code embedded within another program is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
سؤال
The Conficker worm is notable because

A) it is Cuba's first attempt at cyberwarfare.
B) it is the fastest spreading worm of all time.
C) it shut down the White House Web site for three days.
D) computer experts have found it particularly difficult to eradicate.
E) All of the above.
سؤال
A program with a benign capability that conceals another, sinister purpose is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
سؤال
The Internet worm was released by

A) John Barlow.
B) Katie Hafner.
C) John Markoff.
D) Robert Morris, Jr..
E) Bruce Sterling.
سؤال
Manipulating someone within an organization to gain access to confidential information is called

A) diving.
B) hacking.
C) phreaking.
D) social engineering.
E) trashing.
سؤال
Determining that a person is who he or she claims to be on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
سؤال
Anonymous is

A) an activist group that promotes the interests of the Recording Industry Association of America.
B) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
C) the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world.
D) the name of the group that launched the Stuxnet worm.
E) All of the above except c.
سؤال
The process of determining that a user has permission to perform a particular action on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
سؤال
A self-contained program that spreads through a computer network by exploiting security holes is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/12
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Computer and Network Security
1
You may find a virus

A) on a hard disk.
B) on a floppy disk.
C) on a CD-ROM.
D) in an email attachment.
E) All of the above
E
2
An intentional action designed to prevent legitimate users from making use of a computer service is called

A) a bombing run.
B) a curtain closer.
C) a denial-of-service attack.
D) an electronic overdose.
E) phreaking.
C
3
A software program that responds to commands sent by a command-and-control program located on an external computer is called a

A) bot.
B) spoof.
C) vampire.
D) virus.
E) worm.
A
4
A piece of self-replicating code embedded within another program is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
5
The Conficker worm is notable because

A) it is Cuba's first attempt at cyberwarfare.
B) it is the fastest spreading worm of all time.
C) it shut down the White House Web site for three days.
D) computer experts have found it particularly difficult to eradicate.
E) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
6
A program with a benign capability that conceals another, sinister purpose is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Internet worm was released by

A) John Barlow.
B) Katie Hafner.
C) John Markoff.
D) Robert Morris, Jr..
E) Bruce Sterling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
8
Manipulating someone within an organization to gain access to confidential information is called

A) diving.
B) hacking.
C) phreaking.
D) social engineering.
E) trashing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
9
Determining that a person is who he or she claims to be on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
10
Anonymous is

A) an activist group that promotes the interests of the Recording Industry Association of America.
B) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
C) the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world.
D) the name of the group that launched the Stuxnet worm.
E) All of the above except c.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
11
The process of determining that a user has permission to perform a particular action on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
12
A self-contained program that spreads through a computer network by exploiting security holes is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.