Chapter 12, Practice Quiz 2

Chapter 12, Practice Quiz 2 - 1) Malicious human activity...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Sheet1 Page 1 1) Malicious human activity also includes both hackers who break into a system and virus and worm writers who infect compu t e Score: 1 Answer(s): True 2) When unauthorized programs invade a computer system and replace legitimate programs, __________ occurs. (1point) snuffing spoofing usurpation data drowning Score: 1 Answer(s): usurpation 3) Balancing the costs and benefits of the security program is the function of the IT department. (1point) Score: 0
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Sheet1 Page 2 Answer(s): False 4) _____________ are protections against security threats. (1point) Security flags Backup data Vigilante programs Safeguards Score: 1 Answer(s): Safeguards 5) The three categories of authentication are what you know, what you are, and ____________. (1point) where you live who you know what you have what you think Score: 1 Answer(s): what you have 6) Viruses, worms, Trojan horses, spyware, and adware are all categorized as _________. (1point)
Background image of page 2
Sheet1 Page 3 malware hostware spoofware wetware Score:
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/23/2010 for the course COMP SCI 1032 taught by Professor Goldstein during the Winter '10 term at UWO.

Page1 / 6

Chapter 12, Practice Quiz 2 - 1) Malicious human activity...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online