Applications and Systems Development Prep Test


1. 

Masquerading as another person in order to illicitly obtain information is known as

  1. Hacking

  2. Social engineering

  3. Extortion

  4. Exhumation

image from book

2. 

Viruses, worms, and Trojan horses are known as

  1. Maniacal code

  2. Fractured code

  3. Infectious code

  4. Malicious code

image from book

3. 

Antivirus software that detects viruses by watching for anomalous behavior uses what technique?

  1. Signature matching

  2. Fleuristics

  3. Heroistics

  4. Heuristics

image from book

4. 

A developer, suspecting that he may be fired soon, modifies an important program that will corrupt payroll files long after he is gone. The developer has created a(n)

  1. Delayed virus

  2. Logic bomb

  3. Applet bomb

  4. Trojan horse

image from book

5. 

A SYN flood is an example of a

  1. Dictionary attack

  2. High Watermark attack

  3. Buffer Overflow attack

  4. Denial of Service attack

image from book

6. 

The process of recording changes made to systems is known as

  1. Change Review Board

  2. System Maintenance

  3. Change Management

  4. Configuration Management

image from book

7. 

A system that accumulates knowledge by observing events’ inputs and outcomes is known as a(n)

  1. Expert system

  2. Neural network

  3. Synaptic network

  4. Neural array

image from book

8. 

The business logic present in an object is known as

  1. Encapsulation

  2. Personality

  3. Behavior

  4. Method

image from book

9. 

The restricted environment that Java applets occupy is known as a

  1. Sandbox

  2. Workbox

  3. Trusted Zone

  4. Instantiation

image from book

10. 

The process of requesting, reviewing, and approving changes made to systems is known as

  1. Change Review Board

  2. System Maintenance

  3. Change Management

  4. Configuration Management

image from book

Answers

1. 

B. Social engineering. Social engineering is the process of obtaining information from people by tricking them into giving up an important piece of information such as a modem access number. Review “System Attack Methods.”

2. 

D. Malicious code. Malicious code is the generic term used to describe computer codes used to inflict damage on a computer system. Review “Malicious code.”

3. 

D. Heuristics. Heuristicsis the technique used to detect viruses by recognizing anomalous behavior. Review “Malicious code.”

4. 

B. Logic bomb. A logic bombis a type of malicious code that is designed to cause damage at a predetermined date in the future. Review “Malicious code.”

5. 

D. Denial of Service attack.These attacks are designed to incapacitate a system by flooding it with traffic. Review “Denial of Service.”

6. 

D. Configuration Management.This is the process used to record all configuration changes to hardware and software. Review “Configuration Management.”

7. 

B. Neural network. Neural networks become proficient at predicting outcomes by making large numbers of observations, noting inputs and results of each. Review “Neural networks.”

8. 

D. Method. A methodis the formal name given to business logic - also known as code- present in an object. Review “Object-Oriented Environments.”

9. 

A. Sandbox.This is the name given to the restricted environment that Java applets reside in. Review “Applets.”

10. 

C. Change management. Change management is the process used to request, review, approve, implement, and document changes in a system. Review “Change Management.”




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net