CIS Ch 5 part 3

Unlock all answers in this set

Unlock answers
question
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable cuphertext?
answer
an encryption algorithm
question
Which of the following statements is not true about Internet and network attacks?
answer
Information kept on an organization's premises has higher security risk than information transmitted over networks.
question
Which of the following refers to a technique intruders use to make their network of Internet transmission appear legitimate to a victim computer or network?
answer
spoofing
question
The term zombie is...
answer
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
question
The term botnet means
answer
a group of compromised computers connected to a network that attacks other networks
question
a perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
answer
authoring ActiveX scripts
question
The term back door, as it refers to computer crime is
answer
a program or set of instructions that allows users to bypass security controls when accessing a program computer or network
question
An IT code of conduct is written guideline that helps determine whether a specific computer action is which of the following
answer
ethical
question
Which of the following is a duplicate of a file, program or disk that can be used if the original is lost, damaged, or destroyed?
answer
backup
question
Which of the following statements is not true about intellectual property rights?
answer
The term fair use refers to the rights which creators are entitled for their works.
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
decryption
question
Which of the following is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
answer
a digital signature
question
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
answer
network
question
Which of the following is the least likely motive for a DDoS?
answer
spoofing
question
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
answer
substitution
question
How long can digital certificates be valid?
answer
two years
question
Which of the following can be used to create a software registration number, sometimes illegally?
answer
Keygen
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New