1. | Masquerading as another person in order to illicitly obtain information is known as
|
|
2. | Viruses, worms, and Trojan horses are known as
|
|
3. | Antivirus software that detects viruses by watching for anomalous behavior uses what technique?
|
|
4. | A developer, suspecting that he may be fired soon, modifies an important program that will corrupt payroll files long after he is gone. The developer has created a(n)
|
|
5. | A SYN flood is an example of a
|
|
6. | The process of recording changes made to systems is known as
|
|
7. | A system that accumulates knowledge by observing events’ inputs and outcomes is known as a(n)
|
|
8. | The business logic present in an object is known as
|
|
9. | The restricted environment that Java applets occupy is known as a
|
|
10. | The process of requesting, reviewing, and approving changes made to systems is known as
|
|
Answers
1. | B. Social engineering. Social engineering is the process of obtaining information from people by tricking them into giving up an important piece of information such as a modem access number. Review “System Attack Methods.” |
2. | D. Malicious code. Malicious code is the generic term used to describe computer codes used to inflict damage on a computer system. Review “Malicious code.” |
3. | D. Heuristics. Heuristicsis the technique used to detect viruses by recognizing anomalous behavior. Review “Malicious code.” |
4. | B. Logic bomb. A logic bombis a type of malicious code that is designed to cause damage at a predetermined date in the future. Review “Malicious code.” |
5. | D. Denial of Service attack.These attacks are designed to incapacitate a system by flooding it with traffic. Review “Denial of Service.” |
6. | D. Configuration Management.This is the process used to record all configuration changes to hardware and software. Review “Configuration Management.” |
7. | B. Neural network. Neural networks become proficient at predicting outcomes by making large numbers of observations, noting inputs and results of each. Review “Neural networks.” |
8. | D. Method. A methodis the formal name given to business logic - also known as code- present in an object. Review “Object-Oriented Environments.” |
9. | A. Sandbox.This is the name given to the restricted environment that Java applets reside in. Review “Applets.” |
10. | C. Change management. Change management is the process used to request, review, approve, implement, and document changes in a system. Review “Change Management.” |