Full Download of Computer Security Principles And Practice Global 3rd Edition Stallings Test Bank in PDF DOCX Format
Full Download of Computer Security Principles And Practice Global 3rd Edition Stallings Test Bank in PDF DOCX Format
com
https://testbankdeal.com/product/computer-security-
principles-and-practice-global-3rd-edition-stallings-test-
bank/
OR CLICK HERE
DOWNLOAD NOW
https://testbankdeal.com/product/computer-security-principles-and-
practice-global-3rd-edition-stallings-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/computer-security-principles-and-
practice-3rd-edition-stallings-test-bank/
testbankdeal.com
https://testbankdeal.com/product/computer-security-principles-and-
practice-3rd-edition-stallings-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/human-nutrition-science-for-healthy-
living-1st-edition-stephenson-solutions-manual/
testbankdeal.com
Heat and Mass Transfer Fundamentals and Applications 5th
Edition Cengel Solutions Manual
https://testbankdeal.com/product/heat-and-mass-transfer-fundamentals-
and-applications-5th-edition-cengel-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/essentials-of-marketing-13th-edition-
perreault-test-bank/
testbankdeal.com
https://testbankdeal.com/product/marketing-real-people-real-
choices-7th-edition-solomon-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/university-calculus-early-
transcendentals-3rd-edition-hass-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/essentials-for-nursing-practice-9th-
edition-potter-test-bank/
testbankdeal.com
Learning and Behavior 7th Edition Paul Chance Solutions
Manual
https://testbankdeal.com/product/learning-and-behavior-7th-edition-
paul-chance-solutions-manual/
testbankdeal.com
Computer Security: Principles and Practice, 3rd Edition Chapter 6
TRUE/FALSE QUESTIONS:
T F 1. Malicious software aims to trick users into revealing sensitive personal data.
T F 2. Keyware captures keystrokes on a compromised system.
T F 3. Metamorphic code is software that can be shipped unchanged to a
heterogeneous collection of platforms and execute with identical semantics.
T F 6. A logic bomb is the event or condition that determines when the payload is
activated or delivered.
T F 7. Many forms of infection can be blocked by denying normal users the right to
modify programs on the system.
T F 11. A Trojan horse is an apparently useful program containing hidden code that,
when invoked, performs some harmful function.
T F 12. Packet sniffers are mostly used to retrieve sensitive information like
usernames and passwords.
T F 13. A bot propagates itself and activates itself, whereas a worm is initially
controlled from some central facility.
1. A program that is covertly inserted into a system with the intent of compromising the
integrity or confidentiality of the victim’s data is __________.
A. Adobe B. Animoto
C. malware D. Prezi
2. __________ are used to send large volumes of unwanted e-mail.
A. Rootkits B. Spammer programs
C. Downloaders D. Auto-rooter
3. A __________ is code inserted into malware that lies dormant until a predefined
condition, which triggers an unauthorized act, is met.
A. logic bomb B. trapdoor
C. worm D. Trojan horse
4. The term “computer virus” is attributed to __________.
A. Herman Hollerith B. Fred Cohen
C. Charles Babbage D. Albert Einstein
5. Computer viruses first appeared in the early __________.
A. 1960s B. 1970s
C. 1980s D. 1990s
6. The __________ is what the virus “does”.
A. infection mechanism B. trigger
C. logic bomb D. payload
7. The __________ is when the virus function is performed.
A. dormant phase B. propagation phase
C. triggering phase D. execution phase
8. During the __________ the virus is idle.
A. dormant phase B. propagation phase
C. triggering phase D. execution phase
Computer Security: Principles and Practice, 3rd Edition Chapter 6
3. A computer __________ is a piece of software that can “infect” other programs or any
type of executable content and tries to replicate itself.
4. Sometimes referred to as the “infection vector”, the __________ is the means by which
a virus spreads or propagates.
5. Sometimes known as a “logic bomb”, the __________ is the event or condition that
determines when the payload is activated or delivered.
6. The four phases of a typical virus are: dormant phase, triggering phase, execution phase
and __________ phase.
7. During the __________ phase the virus is activated to perform the function for which it
was intended.
10. A __________ is when a user views a Web page controlled by the attacker that
contains a code that exploits the browser bug and downloads and installs malware on the
system without the user’s knowledge or consent.
12. A bot can use a __________ to capture keystrokes on the infected machine to retrieve
sensitive information.
13. Countermeasures for malware are generally known as _________ mechanisms because
they were first developed to specifically target virus infections.
Computer Security: Principles and Practice, 3rd Edition Chapter 6
14. Developed by IBM and refined by Symantec, the __________ provides a malware
detection system that will automatically capture, analyze, add detection and shielding, or
remove new malware and pass information about it to client systems so the malware can be
detected before it is allowed to run elsewhere.
15. __________ technology is an anti-virus approach that enables the anti-virus program to
easily detect even the most complex polymorphic viruses and other malware, while
maintaining fast scanning speeds.
Random documents with unrelated
content Scribd suggests to you:
S'ils pouvaient au servage incliner leur
fierté.
LES HIBOUX
SPLEEN
SPLEEN
SPLEEN
SPLEEN
BRUMES ET PLUIES
L'IRRÉMÉDIABLE
I
Une Idée, une Forme, un Être
Parti de l'azur et tombé
Dans un Styx bourbeux et plombé
Où nul œil du Ciel ne pénètre;
Un malheureux ensorcelé
Dans ses tâtonnements futiles,
Pour fuir d'un lieu plein de reptiles,
Cherchant la lumière et la clé;
II
Valetaille de rimeurs
Te dédiant leurs primeurs
Et contemplant ton soulier
Sous l'escalier,
LE CRÉPUSCULE DU SOIR
LE CRÉPUSCULE DU MATIN
LE TONNEAU DE LA HAINE
LE REVENANT
Et je te donnerai, ma brune,
Des baisers froids comme la lune
Et des caresses de serpent
Autour d'une fosse rampant.
LE MORT JOYEUX
Dans une terre grasse et pleine d'escargots
Je veux creuser moi-même une fosse
profonde.
Où je puisse à loisir étaler mes vieux os
Et dormir dans l'oubli comme un requin
dans l'onde.
SÉPULTURE
TRISTESSES DE LA LUNE
LA MUSIQUE
LA PIPE
FLEURS DU MAL
LA DESTRUCTION