كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها – Telegram
كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها
1.26K subscribers
243 photos
4 videos
765 files
177 links
لكل ما يخص الحاسوب
Download Telegram
للطلاب الذي طلبوا مقرر الدكتور ناجي ☝️☝️☝️
للذي ما قدر يذاكر هذا رد الدكتور ناجي الشيباني لطريقة الاختبار

تحياتي 🌹
🔥2
You are trying to explain security to a nontechnical manager. She has taken a rather extreme
view of computer security. Which of the following is one of the extreme viewpoints about
computer security discussed in this chapter?
Anonymous Quiz
70%
There are no imminent dangers to your system.
12%
The federal government will handle security.
9%
. Microsoft will handle security.
9%
There is no danger if you use Linux.
You have just taken over as network security administrator for a small community college. You
want to take steps to secure your network. Before you can formulate a defense for a network,
what do you need?
Anonymous Quiz
22%
Appropriate security certifications
75%
A clear picture of the dangers to be defended against
1%
To finish this textbook
3%
The help of an outside consultant
Mary is teaching an introductory cybersecurity course to freshmen. She is explaining to them
the major threats. Which of the following is not one of the three major classes of threats?
Anonymous Quiz
16%
Attempts to intrude on the system
15%
Denial of service attacks
14%
A computer virus
54%
Online auction fraud
Elizabeth is explaining various hacking terms to a class. She is in the process of discussing
the history of phone system hacking. What is the term for hacking a phone system?
Anonymous Quiz
8%
Telco-hacking
10%
Hacking
12%
Cracking
70%
Phreaking
What is the name for the hacking technique that involves using persuasion and deception to
get a person to provide information to help compromise security?
Anonymous Quiz
83%
A. Social engineering
0%
B. Conning
6%
C. Human intel
11%
D. Soft hacking
There are many threats on the Internet. Which one is currently the most common may
change over time, but certain threats have always been more common than others. Which of
the following is the most common threat on the Internet?
Anonymous Quiz
13%
A. Auction fraud
11%
B. Phreaking
69%
C. Computer viruses
7%
D. Illegal software
Defining your security strategy is an important step in securing a network. You are trying to
classify devices based on the approach they take to security. An intrusion detection system is
an example of which of the following?
Anonymous Quiz
55%
A. Proactive security
22%
B. Perimeter security
14%
C. Hybrid security
9%
D. Good security practices
According to a survey of 223 computer professionals prepared by the Computer Security
Institute, which of the following was most often cited as an issue by respondents?
Anonymous Quiz
15%
A. Internal systems
67%
B. Employee abuse
12%
C. Routers
6%
D. Internet connection