Filters
Question type

The ____ maintains a file of user IDs and corresponding passwords.


A) switch
B) router
C) operating system
D) firewall

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Sometimes the word cracker is used to denote those who break into someone else's computer.

A) True
B) False

Correct Answer

verifed

verified

A(n) Trojan horse embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system. _________________________

A) True
B) False

Correct Answer

verifed

verified

Any positive ____________________ is either a prime number or a number that can be written in a unique way as a product of prime factors.

Correct Answer

verifed

verified

Firewall software guards the access points to your computer, blocking communications to or from sites you don't permit. _________________________

A) True
B) False

Correct Answer

verifed

verified

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.


A) authentication
B) encryption
C) access
D) interference

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Provide at least five examples of ways in which you can protect yourself from online threats.

Correct Answer

verifed

verified

•Be sure your computer has up-to-date an...

View Answer

A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.


A) hash function
B) encryption function
C) mash function
D) stash function

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.


A) block
B) Trojan
C) Caesar
D) Brutus

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.

Correct Answer

verifed

verified

A denial-of-service (DOS) attack is typi...

View Answer

Showing 41 - 50 of 50

Related Exams

Show Answer