Question 16 What is a common tactic hackers use to allow the

Question 16

What is a common tactic hackers use to allow themselves re-access to a system?

Keystroke capture

Trap door

Backdoor

Rootkit

2.5 points

Question 17

What types of viruses propagate through the Internet with no user intervention?

Virus hoaxes

Stealth viruses

Worms

Trojan Horses

2.5 points

Question 18

A Web merchant wants to ensure that people cannot deny that they entered into a transaction, so they starting using digital signatures and encryption as part of their transaction processing.   This is an example of what?

Integrity

Confidentiality

Authenticity

Non-repudiation

2.5 points

Question 19

What is the main solution used to prevent unauthorized access to systems, data, and applications?

Passwords

User profiles

Biometrics

Firewalls

2.5 points

Question 20

Which of the following refers to security solutions that protect access to systems, applications, or data by ensuring users or systems are authenticated and allowed to have such access?

Physical access controls

User Profiles

Logical access controls

System access controls

A.

Keystroke capture

B.

Trap door

C.

Backdoor

D.

Rootkit

Solution

16. (D) Rootkit

17. (C) Worms

18. (D) Non-repudiation

19. (D) Firewalls

20. (D) System access controls

Question 16 What is a common tactic hackers use to allow themselves re-access to a system? Keystroke capture Trap door Backdoor Rootkit 2.5 points Question 17 W
Question 16 What is a common tactic hackers use to allow themselves re-access to a system? Keystroke capture Trap door Backdoor Rootkit 2.5 points Question 17 W

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site