Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 16 What is a common tactic hackers use to allow themselves re-access to

ID: 3930394 • Letter: Q

Question

Question 16

What is a common tactic hackers use to allow themselves re-access to a system?

Keystroke capture

Trap door

Backdoor

Rootkit

2.5 points

Question 17

What types of viruses propagate through the Internet with no user intervention?

Virus hoaxes

Stealth viruses

Worms

Trojan Horses

2.5 points

Question 18

A Web merchant wants to ensure that people cannot deny that they entered into a transaction, so they starting using digital signatures and encryption as part of their transaction processing.   This is an example of what?

Integrity

Confidentiality

Authenticity

Non-repudiation

2.5 points

Question 19

What is the main solution used to prevent unauthorized access to systems, data, and applications?

Passwords

User profiles

Biometrics

Firewalls

2.5 points

Question 20

Which of the following refers to security solutions that protect access to systems, applications, or data by ensuring users or systems are authenticated and allowed to have such access?

Physical access controls

User Profiles

Logical access controls

System access controls

A.

Keystroke capture

B.

Trap door

C.

Backdoor

D.

Rootkit

Explanation / Answer

16. (D) Rootkit

17. (C) Worms

18. (D) Non-repudiation

19. (D) Firewalls

20. (D) System access controls

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote