Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

(Multiple Choice)
4.8/5
(39)

In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.

(True/False)
4.8/5
(43)

Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

(True/False)
4.8/5
(33)

One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all departments as well as upper management.

(True/False)
4.8/5
(41)

In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.

(Multiple Choice)
4.8/5
(31)

A ________ is rented from a third party and usually contains telecommunication equipment.

(Multiple Choice)
4.8/5
(29)

List the actions that a firewall can take after examining a packet.

(Essay)
4.8/5
(24)

A(n)_____ network is often used so that remote users have a secure connection to an organization's network.

(Multiple Choice)
4.9/5
(33)

In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.

(Multiple Choice)
4.8/5
(33)

Before establishing a security program, organizations should __________.

(Multiple Choice)
4.7/5
(29)

When developing a comprehensive security plan, which of the following steps is not recommended?

(Multiple Choice)
4.9/5
(31)

Which statement is true of symmetric encryption?

(Multiple Choice)
4.7/5
(35)

When planning a comprehensive security system, the first step is designing _____ , which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.

(Multiple Choice)
4.7/5
(28)

John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.

(Multiple Choice)
4.8/5
(41)

_____  is one of the most popular password managers.

(Multiple Choice)
4.9/5
(36)

In the context of data encryption, briefly describe asymmetric encryption.

(Essay)
4.9/5
(30)

A _____  is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.

(Multiple Choice)
4.7/5
(40)

Explain the use of callback modems as a nonbiometric security measure.

(Essay)
4.9/5
(20)

Describe how a virtual private network (VPN)works.

(Essay)
4.8/5
(26)

Which statement best describes spyware?

(Multiple Choice)
5.0/5
(29)
Showing 21 - 40 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)