Block 5 all Units

Block 5 all Units

Assessment

Flashcard

Computers

University

Medium

Created by

Wayground Content

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

133 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Part of the STRIDE mode. Pretending to be something or someone other than yourself.

Back

Spoofing

2.

FLASHCARD QUESTION

Front

Part of the STRIDE model: Modifying something on disk, network, memory, or elsewhere.

Back

Tampering

3.

FLASHCARD QUESTION

Front

What kind of threat has authorization to access a system but uses it in a way that is not approved by the party that granted authorization?

Back

Insider Threat

4.

FLASHCARD QUESTION

Front

A _____ is an aggregation of compromised computers, turning them into _____ to be used by attackers.

Back

Botnet, robots

5.

FLASHCARD QUESTION

Front

A _______ is a flaw or weakness in a system's design, implementation, or operation management that could be exploited to violate the system's security policy.

Back

Vulnerability

6.

FLASHCARD QUESTION

Front

A computer network attack is an _____ act by which an _______ threat attempts to evade security services and violate the security policy of a system.

Back

Intentional, intelligent

7.

FLASHCARD QUESTION

Front

_______ attacks occur when more requests are sent to a machine (host) than it can handle.

Back

Denial of Service

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?