Deck 7: Computer and Network Security

ملء الشاشة (f)
exit full mode
سؤال
An intentional action designed to prevent legitimate users from making use of a computer service is called

A) a bombing run.
B) a curtain closer.
C) a denial-of-service attack.
D) an electronic overdose.
E) phreaking.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The Conficker worm is notable because

A) it is Cuba's first attempt at cyberwarfare.
B) it is the fastest spreading worm of all time.
C) it shut down the White House Web site for three days.
D) computer experts have found it particularly difficult to eradicate.
E) All of the above.
سؤال
An intentional action designed to prevent legitimate users from making use of a computer service is called a .
سؤال
Determining that a person is who he or she claims to be on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
سؤال
You may find a virus

A) on a hard disk.
B) on a floppy disk.
C) on a CD-ROM.
D) in an email attachment.
E) All of the above
سؤال
Manipulating someone within an organization to gain access to confidential information is called

A) diving.
B) hacking.
C) phreaking.
D) social engineering.
E) trashing.
سؤال
According to some estimates, 90 percent of spam is distributed through networks.
سؤال
The Internet worm was released by

A) John Barlow.
B) Katie Hafner.
C) John Markoff.
D) Robert Morris, Jr..
E) Bruce Sterling.
سؤال
A is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
سؤال
The process of determining that a user has permission to perform a particular action on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
سؤال
A is a piece of self-replicating code embedded within another program called the host.
سؤال
A self-contained program that spreads through a computer network by exploiting security holes is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
سؤال
The criminalizes a wide variety of hacker-related activities.
سؤال
The manipulation of a person inside an organization to gain access to confidential information is called .
سؤال
A file accompanying an email message is called an .
سؤال
A program with a benign capability that conceals another, sinister purpose is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
سؤال
A software program that responds to commands sent by a command-and-control program located on an external computer is called a

A) bot.
B) spoof.
C) vampire.
D) virus.
E) worm.
سؤال
Vote-counting irregularities in the State of in the 2000 U.S. Presidential election led to more interest in computerized voting systems.
سؤال
A piece of self-replicating code embedded within another program is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
سؤال
A is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Computer and Network Security
1
An intentional action designed to prevent legitimate users from making use of a computer service is called

A) a bombing run.
B) a curtain closer.
C) a denial-of-service attack.
D) an electronic overdose.
E) phreaking.
C
2
The Conficker worm is notable because

A) it is Cuba's first attempt at cyberwarfare.
B) it is the fastest spreading worm of all time.
C) it shut down the White House Web site for three days.
D) computer experts have found it particularly difficult to eradicate.
E) All of the above.
D
3
An intentional action designed to prevent legitimate users from making use of a computer service is called a .
denial-of-service DoS attack
4
Determining that a person is who he or she claims to be on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
You may find a virus

A) on a hard disk.
B) on a floppy disk.
C) on a CD-ROM.
D) in an email attachment.
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
Manipulating someone within an organization to gain access to confidential information is called

A) diving.
B) hacking.
C) phreaking.
D) social engineering.
E) trashing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
According to some estimates, 90 percent of spam is distributed through networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Internet worm was released by

A) John Barlow.
B) Katie Hafner.
C) John Markoff.
D) Robert Morris, Jr..
E) Bruce Sterling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
A is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
The process of determining that a user has permission to perform a particular action on a computer is called

A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
A is a piece of self-replicating code embedded within another program called the host.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
A self-contained program that spreads through a computer network by exploiting security holes is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
The criminalizes a wide variety of hacker-related activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
The manipulation of a person inside an organization to gain access to confidential information is called .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
A file accompanying an email message is called an .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
A program with a benign capability that conceals another, sinister purpose is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
A software program that responds to commands sent by a command-and-control program located on an external computer is called a

A) bot.
B) spoof.
C) vampire.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Vote-counting irregularities in the State of in the 2000 U.S. Presidential election led to more interest in computerized voting systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
A piece of self-replicating code embedded within another program is called a

A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
A is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.