it security defense against the digital dark arts week 1 answers
Malicious Software
1. In the CIA Triad, "Confidentiality" means ensuring that data is:
- accurate and was not tampered with.
- available and that people can access it.
- not accessible by unwanted parties.
- accessible anonymously.
2. In the CIA Triad, "Integrity" means ensuring that data is:
- available and that people can access it.
- truthful and honest.
- accurate and was not tampered with.
- not accessible by unwanted parties.
3. In the CIA Triad, "Availability" means ensuring that data is:
- available to anyone from anywhere.
- available and people can access it.
- not accessible by unwanted parties.
- accurate and was not tampered with.
4. What's the relationship between a vulnerability and an exploit?
- An exploit creates a vulnerability in a system.
- An exploit takes advantage of a vulnerability to run arbitrary code or gain access.
- They’re unrelated.
- A vulnerability takes advantage of an exploit to run arbitrary code or gain access.
5. Which statement is true for both a worm and a virus?
- They infect other files with malicious code.
- They’re self-replicating and self-propagating.
- They don’t cause any harm to the target system.
- They’re undetectable by antimalware software.
7. What are the characteristics of a rootkit? Check all that apply.
- Is harmless
- Is difficult to detect
- Is destructive
- Provides elevated credentials