Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

Free
(True/False)
4.8/5
(18)
Correct Answer:
Verified

False

The cost of setting up a virtual private network (VPN)is usually high.

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

False

_____ uses a public key known to everyone and a private key known only to the recipient.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

B

Which of the following statements is true of a worm?

(Multiple Choice)
4.8/5
(38)

_____  is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.

(Multiple Choice)
4.9/5
(39)

An organization's comprehensive security plan should include procedures for installing software patches and updates on a regular basis.

(True/False)
4.9/5
(33)

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

(Multiple Choice)
5.0/5
(31)

_____  is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.

(Multiple Choice)
4.9/5
(33)

If disaster strikes, which of the following is a step that an organization should follow in order to resume normal operations?

(Multiple Choice)
4.9/5
(30)

A(n)_____ contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.

(Multiple Choice)
4.9/5
(34)

_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.

(Multiple Choice)
4.8/5
(35)

Which of the following is a biometric security measure?

(Multiple Choice)
4.9/5
(40)

Describe the three levels of security in a comprehensive security system.

(Essay)
4.9/5
(29)

Viruses can be transmitted through a network or through e-mail attachments.

(True/False)
4.8/5
(43)

If a drive in a redundant array of independent disks (RAID)system fails, data stored on it can be reconstructed from data stored on the remaining drives.

(True/False)
4.9/5
(34)

Data sent through a virtual private network (VPN)can be encrypted using the _____.

(Multiple Choice)
4.9/5
(37)

When a computer is infected by a virus, _____.

(Multiple Choice)
4.8/5
(32)

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

(True/False)
4.7/5
(36)

Which statement is true of firewalls?

(Multiple Choice)
4.9/5
(38)

In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.

(Multiple Choice)
4.9/5
(47)
Showing 1 - 20 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)