Differentiate among various systems security threats
Differentiate among various systems security threats
1. Which of the following is the most common result of a buffer overflow?
❍ A. Privilege escalation
❍ B. Disguised malicious programs
❍ C. Code replication
❍ D. Collection of personal data
Differentiate among various systems security threats
2. Which of the following best describes a virus?
❍ A. An action that exceeds the storage-space allocation of
an application
❍ B. A program disguised as a useful application
❍ C. A program designed to attach itself to other code and
replicate
❍ D. Software that communicates information from a user’s
system without notifying the user
3. Which of the following is best describes a Trojan?
❍ A. It infects other systems only after a user executes the
application that it is buried in.
❍ B. It sends messages to a computer with an IP address
indicating that the message is coming from a trusted
host.
Differentiate among various systems security threats
❍ C. It collects personal information, or changes your computer configuration without appropriately obtaining
prior consent.
❍ D. It is self-replicating and therefore needs no user intervention.
4. Which of the following best describes a rootkit?
❍ A. Software used for the collection of personal data
❍ B. Software hidden on a computer for the purpose of
compromising the system
❍ C. Software that provides the originator with the venue to
propagate
❍ D. Software that reports data such as surfing habits and
sites visited
Quick Check ✓
Quick Answer: 41
Detailed Answer: 44
Quick Answer: 41
Detailed Answer: 44
Quick Answer: 41
Detailed Answer: 44
Quick Answer: 41
Detailed Answer: 44
Domain 1.0: Systems Security 7
5. Which of the following is considered a worm?
❍ A. Melissa
❍ B. Acid Rain
❍ C. Code Red
❍ D. Mocmex
6. A disgruntled employee creates a utility for purging old emails
from the server. Inside the utility is code that will erase the server’s hard drive contents on January 1, 2010. This is an example of
which of the following attacks?
❍ A. Virus
❍ B. Logic bomb
❍ C. Spoofing
❍ D. Trojan horse
7. Which of the following best describes spyware?
❍ A. Software used for the collection of personal data
❍ B. Software hidden on a computer for the purpose of
compromising the system
❍ C. Software that provides the originator with the venue to
propagate
❍ D. Software that reports data such as surfing habits and
sites visited
8. Which of the following is the best reason not to request to be
removed from a mailing list in a reply to an unsolicited email?
❍ A. It allows the sender to spoof your email address.
❍ B. It is a waste of time because the sender very seldom
removes you from the list.
❍ C. It verifies that you have a legitimate, working email
address.
❍ D. It allows the sender to collect personal data.
Differentiate among various systems security threats
9. Which of the following are methods by which email spam lists are
created? (Select all correct answers.)
❍ A. Searching the Web for addresses
❍ B. Scanning newsgroup postings
❍ C. Stealing Internet mailing lists
❍ D. Stealing user email address books
Quick Answer:
Quick Check ✓
Differentiate among various systems security threats
Detailed Answer: 45
Quick Answer: 41
Detailed Answer: 45
Quick Answer: 41
Detailed Answer: 45
Quick Answer: 41
Detailed Answer: 45
Quick Answer: 41
Detailed Answer: 45
8 Chapter 1
10. Which of the following best describes programming errors that
result in allowing someone to gain unauthorized administrative
access?
❍ A. Buffer overflow
❍ B. Virus
❍ C. Trojan
❍ D. Logic bomb
Having a hard time figuring out how to do your assignment?
Ask our experts for help and get it done in no time!
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more