Exam 14: Choosing Defense Strategies
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
Which is NOT an encryption program discussed by the author?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
D
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
D
Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.
Free
(Short Answer)
4.8/5
(24)
Correct Answer:
propaganda
Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.
(Short Answer)
4.8/5
(33)
____________ is any attempt to manipulate information in pursuit of a military or political goal.
(Short Answer)
4.9/5
(35)
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
(Short Answer)
4.7/5
(41)
Attempting to acquire information to which one does not have legitimate access is called ____________.
(Short Answer)
4.9/5
(35)
Where did the first known attack by terrorists against a country's computer systems occur?
(Multiple Choice)
4.9/5
(34)
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:
(Multiple Choice)
4.7/5
(30)
Which permits a user to read sensitive data without ever having physical access to the target system?
(Multiple Choice)
4.8/5
(42)
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
(Short Answer)
4.9/5
(35)
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?
(Multiple Choice)
4.9/5
(30)
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?
(Multiple Choice)
4.8/5
(39)
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
(Short Answer)
4.9/5
(38)
Which is likely to be a more threatening type of computer attack?
(Multiple Choice)
4.8/5
(35)
Which is LEAST likely to provide access to sensitive data to unauthorized people?
(Multiple Choice)
4.8/5
(35)
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:
(Multiple Choice)
4.8/5
(35)
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?
(Multiple Choice)
4.8/5
(24)
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
(Short Answer)
4.8/5
(39)
Showing 1 - 20 of 24
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)