PDF Download
FREE AND STUDY GAMES ABOUT CHPT 28 SECURITY
EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -48 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: authorization
Answer:
process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.
Question 2: elevation of privilege
Answer:
is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. go from guest to administrative privileges.
Question 3: spyware
Answer:
software that comes hidden in free downloadable software and tracks online movements
Question 4: information secrecy
Answer:
is the category of computer security at addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Question 5: Packet tampering
Answer:
consists of altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network. example attacker might tap a network to intercept packets leaving computer. Attacker could eavesdrop or alter
Question 6: phishing expedition
Answer:
masquerading attack that combines spam with spoofing.
Question 7: digital certificate
Answer:
data file that identifies individuals or organizations online and is comparable to a digital signature.
Question 8: advanced encryption standard (AES)
Answer:
designed to keep government information secure.
Question 9: Splogs (spam blogs)
Answer:
are fake blogs created solely to raise the search engine rank of affiliated websites. using blog to post comment with link to another spam site Question 10: organizations address security risks through two lines of defense: first and second
Answer:
people technology.
Question 11: information security policies
Answer:
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, change passwords every 30 days
Question 12: cryptography
Answer:
science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
Question 13: destructive agents
Answer:
malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines.
Question 14: certificate authority
Answer:
trusted third party ,such as VERISign that validates user identity by means of digital certificates.
Question 15: Time bombs
Answer:
are computer viruses that wait for a specific date before executing their instructions.
Question 16: firewall
Answer:
hardware and software that guard a private network by analyzing incoming and outgoing information for the correct marking.s
Question 17: public key encryption
Answer:
uses two keys a public key that everyone can have and a private key for only the recipient.
Question 18: black hat hackers
Answer:
break into other people's computer systems and may just look around or may steal and or destroy information.
Question 19: public key encryption (PKE)
Answer:
uses two keys: a public key that everyone can have and a private key for only the recipient. public key to all users to send info private key to receiver.
Question 20: zombie farm
Answer:
group of computers on which a hacker has planted zombie programs.
Question 21: hactivists
Answer:
have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Question 22: worm
Answer:
spreads itself not only from file to file but also computer to computer
Question 23: Hoaxes
Answer:
attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message unsuspecting users send the message to others infecting many users along the way
Question 24: spyware
Answer:
is a special class of adware that collects data about the user ad transmits it over the internet without user's knowledge or permission
Question 25: decrpt
Answer:
information is to decode it and is the opposite of encrypt.
Question 26: crackers
Answer:
have criminal intent when hacking
Question 27: sniffer
Answer:
program or device that can monitor data traveling over a network. Sniffers can show all the data being transmitted over a network, ....passwords and sensitive info. Tend to be favorite of hackers