PE B: True/False 1. A logic bomb is the event or condition that detere pcien 2.
ID: 3706918 • Letter: P
Question
PE B: True/False 1. A logic bomb is the event or condition that detere pcien 2. Signature-based (IDS) approaches temo 3. A common location for a NIDS sensor is just inside the 4. The firewall may be a single computer system or a set of wo or 5. 6. 7. when the peylond is activaned or anomaly (IDS) approaches attempt to define proper behuavicr ne sormal, or expected elarior, wh more systems that cs perform the firewall function. Security flaws occur consequence codes in programs. Cross-site scripting attacks attempt to bypass access privileges to sensitive data belonging to another site. Physical security must also prevent any type logical security. as a consequence of sufficient checking and validation of data the browser's security checks to gain of physical access or intrusion that o 8. A keystroke logger is software or a hardware device that could be used to moni 9. All Trojans have the same purpose: to destroy the data on the systenm 10. Rootkits can be used to give the attacker a backdoor access to the system user key strokes 11. Denial-of-service attacks target the confidentiality and integrity of a system o 12. Standard web servers run on ports 80 or 443 13. Many computer security vulnerabilities result from poor programming pract 14. A packet filtering firewall is typically configured to filter packets goin 5. In a virus attack, the victim machine is the source.Explanation / Answer
1)Answer:
True
Explanation:
A logic bomb is the event or condition that determines when the payload is activated or delivered.
2)Answer:
False
Explanation:
Statistical approaches attempt to define normal, or expected,behavior, whereas rule-based approaches attempt to define proper behavior.
3)Answer:
True
Explanation:
A common location for a NIDS sensor is just inside the external firewall.
4)Answer:
True
Explanation:
The firewall may be a single computer system or a set of two or more systemsthat cooperate to perform the firewall function. The firewall, then, provides an additional layer of defense, insulating the inter- nal systems from external networks.
5)Answer:
false
6)Answer:
True
Explanation:
Crosssite scripting attacks attempt to bypass the browser’s securitychecks to gain elevated access privileges to sensitive data belonging to another site
7)Answer:
True
Explanation:
Physical security must also prevent any type of physical access or intrusion that can compromise logical security
8)Answer:
True
Explanation:
keystroke loggers.monitor and record keystrokes and can be software or hardware devices
9)Answer:
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.