1-7 Flashcards

1
Q

after data leaves the netowrk the packets are vuilnerable to

A

interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the view point of : If our computer has not been attacked so far , we must be secure “ often leads to the ___________ approach to computer security

A

reactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

most attacks can be categorized into one of 3 broad classes

A

intrusion, blocking, malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

any attempt to gain unauthorized access to a system

A

intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attacks used to prevent legitimate access to a system

A

blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a generic term for software that has a malicious purpose

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____________ is the most common threat to any system

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

most obvious example of malware is a

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the ___________ sends itself to everyone within your notebook

A

MyDoom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

trojans and viruses are the 2 most common forms of malware, but whats the third

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hardware key loggers require the user to

A

physically go to the equipment to plant the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a software key logger can be installed via a

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

intrusion attacks designed to gain access to a specific system is called hacking. whats another name for hacking

A

cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CERT stands for

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An explicit attempt by attackers to prevent legitimate users of a service from using that service

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly