Filters
Question type

Study Flashcards

Which of the following is an example of a Trojan horse program  


A)  Netsky
B)  MyDoom 
C)  Klez
D)  Happy99.exe

Correct Answer

verifed

verified

Duplication of software-based intellectual property is more commonly known as software ____________________.

Correct Answer

verifed

verified

When information gatherers employ techniques in a commercial setting that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.

Correct Answer

verifed

verified

A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.

Correct Answer

verifed

verified

A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files-such as word-processing documents-and sensitive data transmitted to or from applications.

Correct Answer

verifed

verified

With the removal of copyright protection mechanisms, software can be easily distributed and installed.

Correct Answer

verifed

verified

A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

Correct Answer

verifed

verified

A(n) ____________________ is an application error that occurs when more data is sent to a program than it is designed to handle.

Correct Answer

verifed

verified

buffer ove...

View Answer

DoS attacks cannot be launched against routers.

Correct Answer

verifed

verified

A(n) ____________________ is an act against an asset that could result in a loss.

Correct Answer

verifed

verified

ESD is the acronym for ____________________ discharge.

Correct Answer

verifed

verified

Showing 81 - 91 of 91

Related Exams

Show Answer