Question: What is software that may or may not run as root but that enables a remote party to access the device it runs on ?

What is software that may or may not run as root but that enables a remote party to access the device it runs on?
Group of answer choices
A. worm
B. remote access Trojan
C. Trojan
D. rootkit
Flag question: Question 2
Question 21 pts
The Cinderella attack modifies this aspect of a secure system.
Group of answer choices
A. timeclock
B. hard disk storage
C. user credentials
D. memory
Flag question: Question 3
Question 31 pts
If an attempt to open a file caused it to be read and its permissions checked; then if the user was authorised to access it, it was read again. This would setup conditions for what type of attack?
Group of answer choices
A. denial-of-service attack
B. man-in-the-middle attack
C. race condition attack
D. time-of-check-to-time-of-use attack
Flag question: Question 4
Question 41 pts
Failure modes attributed to malicious actors are referred to as what?
Group of answer choices
A. random failures
B. malicious failures
C. Turkish failures
D. Byzantine failures
Flag question: Question 5
Question 51 pts
Which is not an example of redundancy?
Group of answer choices
A. RAID storage
B. fail-stop CPUs
C. multi-threaded cores
D. fault-tolerant multiprocessor
Flag question: Question 6
Question 61 pts
A network of compromised PCs is called what?
Group of answer choices
A. pcnet
B. botnet
C. skynet
D. robonet
Flag question: Question 7
Question 71 pts
The ACID acronym represnts which desirable features of a transaction in a distributed system?
Group of answer choices
A. atomic, consistent, isolated and durable
B. automatic, consistent, isolated and durable
C. atomic, constrained, isolated and durable
D. automatic, constrained, incorrect and durable
Flag question: Question 8
Question 81 pts
Identity is when two different names (or instances of the same name) correspond to the same principal.
Group of answer choices
A. False
B. True
Flag question: Question 9
Question 91 pts
The dining philosophers problem is an example of which concept?
Group of answer choices
A. concurrency
B. race condition
C. deadlock
D. livelock
Flag question: Question 10
Question 101 pts
When IBM launched the 4753 cryptoprocessor in 1991, they proposed a classification of possible attackers. Which is not one that they proposed?
Group of answer choices
A. knowledgeable insiders
B. script kiddies
C. clever outsiders
D. funded organizations
Flag question: Question 11
Question 111 pts
The first distributed denial-of-service (DDoS) attack may have been the Morris worm in the 1980s.
Group of answer choices
A. False
B. True
Flag question: Question 12
Question 121 pts
SSH was written in 1995 to facilitate logging on to remote computers without sending passwords in the clear. It does this using what type of encryption?
Group of answer choices
A. AES
B. DES
C. Diffie-Hellman public/private key
D. IDEA
Flag question: Question 13
Question 131 pts
Tamper resistant devices are ones in which key extraction would be obvious.
Group of answer choices
A. False
B. True
Flag question: Question 14
Question 141 pts
What is the general name of a self-contained microcontroller, with a microprocessor, memory and a serial interface integrated in a single chip and packaged in a plastic card?
Group of answer choices
A. DIMM card
B. smartcard
C. magnetic strip card
D. SIMM card
Flag question: Question 15
Question 151 pts
A luxury car can now contain dozens to hundreds of different processors.
Group of answer choices
A. False
B. True
Flag question: Question 16
Question 161 pts
What is a malicious program that replicates itself on other systems?
Group of answer choices
A. Trojan
B. rootkit
C. worm
D. remote access trojan
Flag question: Question 17
Question 171 pts
Pseudorandom number generators can generate cryptographically strong random numbers using environmental noise.
Group of answer choices
A. False
B. True
Flag question: Question 18
Question 181 pts
Processes are called concurrent if they can?
Group of answer choices
A. run at the same time
B. run sequentially
C. mandatory access control
D. run on the same core
Flag question: Question 19
Question 191 pts
Atomic transactions must completely succeed or not change the state of the system if they fail. They can not cause some partial state change.
Group of answer choices
A. False
B. True
Flag question: Question 20
Question 201 pts
Security-by-obscurity is the best strategy for making secure products.
Group of answer choices
A. False
B. True

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!