Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?

(Multiple Choice)
4.9/5
(31)

_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.

(Multiple Choice)
4.9/5
(36)

Briefly discuss the process of data encryption.

(Essay)
4.8/5
(33)

_____  is a form of spyware that collects information about a user (without the user's consent)to determine which commercials to display in the user's Web browser.

(Multiple Choice)
4.9/5
(37)

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

(True/False)
4.8/5
(33)

The main drawback of an intrusion detection system (IDS)is its inability to prevent denial-of-service (DoS)attacks.

(True/False)
4.8/5
(30)

According to a 2019 study, which of the following is not an accurate statistic about ransomware attacks?

(Multiple Choice)
4.9/5
(35)

An intrusion detection system (IDS)can protect networks against both external and internal access.

(True/False)
4.9/5
(41)

Which form of text needs to be unscrambled using a decryption key?

(Multiple Choice)
4.8/5
(38)

_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.

(Multiple Choice)
4.8/5
(42)

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

(Multiple Choice)
4.9/5
(35)

In the context of business continuity planning, list at least five of the procedures for keeping an organization operational in the event of a disaster.

(Essay)
4.8/5
(35)

Briefly explain the McCumber cube.

(Essay)
4.7/5
(38)

In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.

(Multiple Choice)
4.8/5
(31)

_____ , a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.

(Multiple Choice)
4.7/5
(31)

Which statement is true of application-filtering firewalls?

(Multiple Choice)
4.8/5
(32)

In the context of access controls, briefly explain the guidelines that need to be followed to increase the effectiveness of passwords.

(Essay)
4.8/5
(30)

Briefly discuss dumpster diving and shoulder surfing, two commonly used social-engineering techniques.

(Essay)
4.8/5
(31)

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

(Multiple Choice)
4.9/5
(37)

_____  is an example of antispyware software.

(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)