REVISION QUESTIONS WITH VERIFIED ANSWERS
A ___________ is a type of malicious code that performs some
system-damaging action when a specific condition occurs. -
ANSWER-logic bomb
A common approach for creating polymorphic viruses uses
encryption technology. - ANSWER-true
A is a set of instructions designed to bypass the normal
authentication mechanism and allow access to the system to
anyone who knows the vulnerability exists - ANSWER-back door
A logic bomb is malware that is set to go off when a particular
system event occurs, such as a particular date and time. -
ANSWER-true
A loss of ________ is the unauthorized disclosure of information. -
ANSWER-confidentiality
A program with both an expected and unexpected effect is a
__________. - ANSWER-trojan horse
, A sender not being able to deny sending a message that he/she, in
fact, did send, is known as message ___________. -
ANSWER-non-repudiation
A threat can be defined as a ____________. - ANSWER-set of
circumstances that could cause harm or loss
Address Space Layout Randomization (ASLR) is a protection
mechanism implemented to prevent buffer overflows at what level
of computer systems? - ANSWER-OS
Amy changing the amount on Bill's check from $100 to $1,000 is a
violation of which computer security property? - ANSWER-integrity
Amy secretly copying Bill's homework is a violation of which
computer security property? - ANSWER-confidentiality
An access control system that grants users only those rights
necessary for them to perform their work is operating on which
security principle? - ANSWER-least privilege
An advantage of behavior-base protection over signature-based
protection is that they are likely to have a lower false positive rate.
- ANSWER-true