Assdt Essay

1893 Words Nov 24th, 2012 8 Pages
Exam
Name___________________________________

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.

1)

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

1)

_______

2)

Viruses can be spread through e-mail.

2)

_______

3)

Public key encryption uses two keys.

3)

_______

4)

Packet filtering catches most types of network attacks.

4)

_______

5)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

5)

_______

6)

Enterprise systems use a client/server architecture and have not yet been redesigned to
…show more content…
16)

Large amounts of data stored in electronic form are ________ than the same data in manual form.

16)

______

A)

vulnerable to many more kinds of threats

B)

more critical to most businesses

C)

more secure

D)

less vulnerable to damage

17)

The main security problem on the Internet is:

17)

______

A)

Natural disasters, such as floods and fires.

B)

Hackers.

C)

Inadequate bandwidth.

D)

Radiation.

18)

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack.

18)

______

A)

pharming

B)

DoS

C)

phishing

D)

DDoS

19)

How do hackers create a botnet?

19)

______

A)

Infecting Web search bots with malware

B)

Using Web search bots to infect other computers

C)

Infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door

D)

Causing other people's computers to become "zombie" PCs following a master computer

20)

Redirecting a Web link to a different address is a form of :

20)

______

A)

spoofing.

B)

snooping.

C)

sniffing.

D)

DDoS.

21)

A key logger is a type of:

21)

______

A)

spyware.

B)

worm.

C)

virus.

Related Documents