Principals of Computer Security
Small bits of text that are stored on a user's machine and sent to specific websites when the user visits are called:
a. |
temp files |
|
b. |
documents |
|
c. |
web history |
|
d. |
cookies |
Answer : d. Cookies
( cookies are used to track a user's activity on a website. It can be accessed by both web server as well as client systems. It stores data of the user who accessed the website.)
Principals of Computer Security Small bits of text that are stored on a user's machine and...
Subject Javascript: Before HTML5, websites could store only small amounts of text-based information on a user's computer using cookies. What are the advantages of using cookies and why are they so important as it pertains to web applications?
Principals of Computer Security A piece of malicious code that sits dormant for a period of time until some event is called a _____________. a. trojan b. logic bomb c. spyware d. rootkit
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrator, however, does not see any suspicious processes running. A prior technician's note indicate the machine has been remediated twice, but the system still exhibits odd behavior. Files were deleted from the system recently. Which of the following is the most likely cause of this behavior? A. Crypto-malware B. Rootbit C. Logic bomb D. Session hijacking
26. The is a group of bits that tells the computer to perform a specific operation A). program counter B). Opcode C). register D). microoperation 27. A condition called occurs in unsigned binary representation of a number when the result of an arithmetic operation is outside the range of allowable precision for the given number of bits. A). underflow B). 2's complement C). overflow D) bitwise complement 28. An iteration of the fetch-decode-execute cycle includes which of the following events?...
ER Modeling: Assignment In order to receive credit for this assignment, you must draw your ER model using a compute program and then turn in on the blackboard. Your ER model should include all of the necessary entity sets, relationships and keys, as well a weak entities and superclass/subclass relationships, if needed. A company decides to implement a software to monitor its employees' web surfing, and stores history of each employee's surfing in a database, as well as all of...
help please as soon as possible The internet is a global .... O A. Administrator O B. Server O C. WAN. OD. LAN. This type of visual display lets you use a mouse to interact with the workspace on the computer screen. O A. Desktop B. BIOS OC. Graphical user interface OD. Operating system A Microphone is a type of this: A. Output device B. No correct answer O c. Input device D. Input Output device _let you work with...
Computer Security Help 21) The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________. A) file backup B) file/folder backup C) image backup D) shadowing 22) Attacks other than application level attacks usually fail to get through SPI firewalls. True False Save 23) Normally, there is no limit on how long shadowing may maintain backed up files. True False 24) Java applets are large Java programs. Question...
TRUE/FALSE QUESTIONS: Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...
6. With respect to database systems, which of the following statement(s) is (are) true? a. The physical view of data is how people conceptually organize and understand the relationships among data items. b. The DML builds the data dictionary, creates the database, describes logical views for each user, and specifies security constraints. c. A record layout shows the items stored in a file, including the type of data stored and both the order and length of the data fields. d....