Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
The value of information comes from the characteristics it possesses.
(True/False)
4.9/5
(41)
Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service?
(Multiple Choice)
4.8/5
(25)
An indirect attack involves a hacker using a personal computer to break into a system.
(True/False)
4.8/5
(40)
Describe how benchmarking and best practices are used and where more information on best practices may be found.
(Essay)
4.9/5
(34)
Which threat is the most common intellectual property (IP) breach?
(Multiple Choice)
4.8/5
(35)
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-The quality or state of having value for some purpose or end.
(Short Answer)
4.9/5
(37)
The security blueprint is a detailed version of the security framework.
(True/False)
4.9/5
(30)
In information security, ____ exists when a vulnerability known to an attacker is present.
(Multiple Choice)
4.9/5
(43)
Describe the issue-specific security policy (ISSP) and list three issues it may cover.
(Essay)
4.9/5
(40)
Which term identifies a single instance of an information asset suffering damage, unintended or unauthorized modification, or disclosure?
(Multiple Choice)
4.9/5
(37)
____________________ is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.
(Essay)
4.9/5
(36)
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-A term meaning information is free from mistakes or errors and has the value that the end user expects it to have.
(Short Answer)
4.8/5
(27)
Which attack is used when a copy of the hash of the user's password has been obtained?
(Multiple Choice)
4.8/5
(37)
The McCumber Cube provides a ____ description of the architectural approach widely used in computer and information security.
(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)