Chapter 10 Security

Chapter 10 Security - The purpose of a(n is to disrupt...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Question 1 1 out of 1 points One way to control threats from active content is to use digital certificates. Selected Answer: True Question 2 1 out of 1 points A cracker is a technologically skilled person who obtains unauthorized entry into computers or network systems. Selected Answer: True Question 3 1 out of 1 points The field of _____ is responsible for the collection, preservation, and analysis of computer-related evidence. Selected Answer: computer forensics Question 4 1 out of 1 points Networks inside a firewall are often called untrusted, whereas networks outside the firewall are called trusted. Selected Answer: False Question 5 1 out of 1 points _____ is the general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat. Selected Answer: Countermeasure Question 6 1 out of 1 points
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: The purpose of a(n) _____ is to disrupt normal computer processing, or deny processing entirely. Selected Answer: necessity threat Question 7 1 out of 1 points Asymmetric encryption encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to encode and decode data. Selected Answer: False Question 8 1 out of 1 points Ethical hackers are often hired by companies to test computer security safeguards. Selected Answer: True Question 9 1 out of 1 points A(n) _____ is a program hidden inside another program or Web page that masks its true purpose. Selected Answer: Trojan horse Question 10 1 out of 1 points A(n) _____ is an area of memory set aside to hold data read from a file or database. Selected Answer: buffer...
View Full Document

Page1 / 2

Chapter 10 Security - The purpose of a(n is to disrupt...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online