SSCPISC2Systems Security Certified Practioner
A Black Hat is someone who uses his skills for offensive purpose. They do not seek authorization before they attempt to comprise the security mechanisms in place. "Grey Hats" are people who sometimes work as a White hat and other times they will work as a "Black Hat", they have not made up their mind yet as to which side they prefer to be. The following are incorrect answers: All the other choices could be possible reasons but the best one today is really for financial gains. References used for this question: and and -06938FE8BB53%7Dhtcb006.pdf QUESTION: 371 What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account? A. Data fiddling B. Data diddling C. Salami techniques D. Trojan horses Answer: C Explanation: Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2001, Page 644. QUESTION: 372 Java is not: A. Object-oriented. B. Distributed. C. Architecture Specific. D. Multithreaded. Answer: C Explanation: JAVA was developed so that the same program could be executed on multiple hardware and operating system platforms, it is not Architecture Specific. The following answers are incorrect:
Object-oriented. Is not correct because JAVA is object-oriented. It should use the object- oriented programming methodology.Distributed. Is incorrect because JAVA was developed to be able to be distrubuted, run on multiple computer systems over a network.Multithreaded. Is incorrect because JAVA is multi-threaded that is calls to subroutines as is the case with object-oriented programming.A virus is a program that can replicate itself on a system but not necessarily spread itself by network connections.QUESTION: 373What is malware that can spread itself over open network connections?A. Worm B. Rootkit C. Adware D. Logic Bomb Answer: A Explanation: Computer worms are also known as Network Mobile Code, or a virus-like bit of code that can replicate itself over a network, infecting adjacent computers. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. A notable example is the SQL Slammer computer worm that spread globally in ten minutes on January 25, 2003. I myself came to work that day as a software tester and found all my SQL servers infected and actively trying to infect other computers on the test network.
You've reached the end of your free preview.
Want to read all 8 pages?
- Fall '20
- Computer Security, Computer virus, Rootkit, Computer worm