Chapter 11 Exercise


  1. A _____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer. (558)
    a. worm
    b. rootkit
    c. payload
    d. cookie
  2. Malware is a term that can be used to describe _____. (558)
    a. worms
    b. rootkits
    c. back doors
    d. all of the above
  3. A _____ is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. (562)
    a. denial of service attack 
    b. zombie
    c. Trojan horse
    d. virus hoax
  4. _____ involves the examination of computer media, programs, data and log files on computers, servers, and
    networks. (569)
    a. Encryption key
    b. E-mail filtering
    c. Digital forensics
    d. Trusted source
  5. Physical access controls, such as locked doors and windows, usually are adequate to protect against _____. (570)
    a. software piracy
    b. unauthorized access
    c. hardware theft
    d. all of the above
  6. A(n) _____ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext. (573)
    a. botnet
    b. certificate authority
    c. encryption algorithm
    d. encryption key
  7. Some organizations continually review their _____, which is a ratio that measures how much power enters the computer facility, or data center, against the amount of power required to run the computers. (583)
    a. uninterruptible power supplies
    b. public key encryption
    c. ENERGY STAR program
    d. power usage effectiveness (PUE)
  8. As related to the use of computers, _____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. (590)
    a. phishing
    b. pharming
    c. social engineering
    d. a virus hoax
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s