Question: What is software that may or may not run as root but that enables a remote party to access the device it runs on ?
What is software that may or may not run as root but that enables a remote party to access the device it runs on
Group of answer choices
A worm
B remote access Trojan
C Trojan
D rootkit
Flag question: Question
Question pts
The Cinderella attack modifies this aspect of a secure system.
Group of answer choices
A timeclock
B hard disk storage
C user credentials
D memory
Flag question: Question
Question pts
If an attempt to open a file caused it to be read and its permissions checked; then if the user was authorised to access it it was read again. This would setup conditions for what type of attack?
Group of answer choices
A denialofservice attack
B maninthemiddle attack
C race condition attack
D timeofchecktotimeofuse attack
Flag question: Question
Question pts
Failure modes attributed to malicious actors are referred to as what?
Group of answer choices
A random failures
B malicious failures
C Turkish failures
D Byzantine failures
Flag question: Question
Question pts
Which is not an example of redundancy?
Group of answer choices
A RAID storage
B failstop CPUs
C multithreaded cores
D faulttolerant multiprocessor
Flag question: Question
Question pts
A network of compromised PCs is called what?
Group of answer choices
A pcnet
B botnet
C skynet
D robonet
Flag question: Question
Question pts
The ACID acronym represnts which desirable features of a transaction in a distributed system?
Group of answer choices
A atomic, consistent, isolated and durable
B automatic, consistent, isolated and durable
C atomic, constrained, isolated and durable
D automatic, constrained, incorrect and durable
Flag question: Question
Question pts
Identity is when two different names or instances of the same name correspond to the same principal.
Group of answer choices
A False
B True
Flag question: Question
Question pts
The dining philosophers problem is an example of which concept?
Group of answer choices
A concurrency
B race condition
C deadlock
D livelock
Flag question: Question
Question pts
When IBM launched the cryptoprocessor in they proposed a classification of possible attackers. Which is not one that they proposed?
Group of answer choices
A knowledgeable insiders
B script kiddies
C clever outsiders
D funded organizations
Flag question: Question
Question pts
The first distributed denialofservice DDoS attack may have been the Morris worm in the s
Group of answer choices
A False
B True
Flag question: Question
Question pts
SSH was written in to facilitate logging on to remote computers without sending passwords in the clear. It does this using what type of encryption?
Group of answer choices
A AES
B DES
C DiffieHellman publicprivate key
D IDEA
Flag question: Question
Question pts
Tamper resistant devices are ones in which key extraction would be obvious.
Group of answer choices
A False
B True
Flag question: Question
Question pts
What is the general name of a selfcontained microcontroller, with a microprocessor, memory and a serial interface integrated in a single chip and packaged in a plastic card?
Group of answer choices
A DIMM card
B smartcard
C magnetic strip card
D SIMM card
Flag question: Question
Question pts
A luxury car can now contain dozens to hundreds of different processors.
Group of answer choices
A False
B True
Flag question: Question
Question pts
What is a malicious program that replicates itself on other systems?
Group of answer choices
A Trojan
B rootkit
C worm
D remote access trojan
Flag question: Question
Question pts
Pseudorandom number generators can generate cryptographically strong random numbers using environmental noise.
Group of answer choices
A False
B True
Flag question: Question
Question pts
Processes are called concurrent if they can?
Group of answer choices
A run at the same time
B run sequentially
C mandatory access control
D run on the same core
Flag question: Question
Question pts
Atomic transactions must completely succeed or not change the state of the system if they fail. They can not cause some partial state change.
Group of answer choices
A False
B True
Flag question: Question
Question pts
Securitybyobscurity is the best strategy for making secure products.
Group of answer choices
A False
B True
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
