星期六, 9月 25, 2010

Threats to data on networked computers

1. A _________ is a simple destructive miniature program that infiltrates its way into computer systems.

Choose an option below to fill in the blank.

VPN
hacker
IP address
virus



2. Which of the following statements regarding hackers are true?

Choose more than one option.

They always gain access to system resources from outside
They use Internet message boards to gain information on system security holes
They impersonate authorized users to gain access to systems
They all aim to defraud the companies whose systems they penetrate



3. What do ethical hackers do?

Choose an option.

Try to break into systems so as to defraud companies
Test a system's security to see where malicious hackers could gain access
Create antivirus software
Impersonate authorized users using a spoof IP address in order to breach system security

推薦此文