Question 16 What is a common tactic hackers use to allow the
Question 16
What is a common tactic hackers use to allow themselves re-access to a system?
Keystroke capture
Trap door
Backdoor
Rootkit
2.5 points
Question 17
What types of viruses propagate through the Internet with no user intervention?
Virus hoaxes
Stealth viruses
Worms
Trojan Horses
2.5 points
Question 18
A Web merchant wants to ensure that people cannot deny that they entered into a transaction, so they starting using digital signatures and encryption as part of their transaction processing. This is an example of what?
Integrity
Confidentiality
Authenticity
Non-repudiation
2.5 points
Question 19
What is the main solution used to prevent unauthorized access to systems, data, and applications?
Passwords
User profiles
Biometrics
Firewalls
2.5 points
Question 20
Which of the following refers to security solutions that protect access to systems, applications, or data by ensuring users or systems are authenticated and allowed to have such access?
Physical access controls
User Profiles
Logical access controls
System access controls
| A. | Keystroke capture | |
| B. | Trap door | |
| C. | Backdoor | |
| D. | Rootkit |
Solution
16. (D) Rootkit
17. (C) Worms
18. (D) Non-repudiation
19. (D) Firewalls
20. (D) System access controls

