Home

Friday, July 27, 2012

ATEC/ Network and Internet Security



 
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
 






   
False
    





 
While two-factor authentication systems are common in the United States, they are not widely used in other countries.





  False

 
True    


 


 
Many Internet security concerns today can be categorized as computer wars.





True    
  False
 





 
____ are sets of tools that allow hackers to access a system.





Toolkits    
Crimekits    
  Rootkits


Hackkits    


 


 


____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee’s computer.
nar002-1.jpg





  Device authentication

 
Professional firewall    
Data-leakage prevention


Network quarantine






 
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.





  Unauthorized Access

  
 
Vandalizing    
Phishing    
Spoofing    




 
One of the biggest disadvantages of password-based systems is that passwords can be forgotten.





False

 
  True

 


 


 
The best protection against many dot cons is ____.





  common sense

 
antivirus programs    
your ISP    
updated operating systems    


 


 
Once installed, ____________________ are designed to record every keystroke made on the infected computer and transmit account numbers, passwords, and other related information to criminals.




1.  RATs 
Equals RATs
Equals
Remote-Access Trojans
Equals
Remote-Access Trojans (RATs)
Equals
RATs (Remote-Access Trojans)





 
In businesses, access control systems are often integrated into a comprehensive ____________________ system designed to manage users’ access to enterprise systems




1.  IDM
Equals IDM (100%)
Equals
identity management (100%)
Equals
identity management (IDM) (100%)
Equals
IDM (identity management) (100%)


No comments:

Post a Comment