Gleim IT Flashcards

1
Q

Attacks on computer networks may take many forms. Which of the following uses the computers of innocent parties infected with Trojan horse programs?

A

A denial-of-service (DoS) attack is an attempt to overload a system (e.g., a network or web server) with false messages so that it cannot function (a system crash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the best policy for the protection of a company’s vital information resources from computer viruses?

A

policies and procedures used with antivirus and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

identity misrepresentation in cyberspace, false web to obtain info about visitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial Service Attack

A

an attempt to overload a system with messages so it cannot function so it crashed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT

A

Evaluate
Direct
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly