Gleim IT Flashcards
Attacks on computer networks may take many forms. Which of the following uses the computers of innocent parties infected with Trojan horse programs?
A denial-of-service (DoS) attack is an attempt to overload a system (e.g., a network or web server) with false messages so that it cannot function (a system crash)
Which of the following is the best policy for the protection of a company’s vital information resources from computer viruses?
policies and procedures used with antivirus and access control
Spoofing
identity misrepresentation in cyberspace, false web to obtain info about visitor
Denial Service Attack
an attempt to overload a system with messages so it cannot function so it crashed
COBIT
Evaluate
Direct
Monitor