Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ is also known as secret key encryption.

(Multiple Choice)
4.9/5
(39)

When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.

(True/False)
4.7/5
(32)

A(n)_____  is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

(Multiple Choice)
4.9/5
(32)

Briefly explain how packet-filtering firewalls work.

(Essay)
4.9/5
(33)

Discuss the functions of the Computer Emergency Response Team (CERT).

(Essay)
4.9/5
(43)

Discuss the guidelines for improving a firewall's capabilities.

(Essay)
4.9/5
(34)

A _____  consists of self-propagating program code that is triggered by a specified time or event.

(Multiple Choice)
4.8/5
(33)

Which biometric security measure compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?

(Multiple Choice)
4.8/5
(33)

The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.

(True/False)
4.8/5
(34)

In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.

(True/False)
5.0/5
(36)

In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.

(Multiple Choice)
4.9/5
(39)

When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.

(True/False)
4.9/5
(32)

_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

(Multiple Choice)
4.8/5
(29)

List several different types of intentional computer and network security threats.

(Essay)
5.0/5
(39)

In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.

(Multiple Choice)
4.8/5
(42)

Which type of access control is used to protect systems from unauthorized access?

(Multiple Choice)
4.8/5
(39)

In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.

(Multiple Choice)
4.7/5
(35)

Which is a nonbiometric security measure?

(Multiple Choice)
4.8/5
(33)

Explain how proximity-release door openers are used as a physical security measure to control access to computers and networks.

(Essay)
4.9/5
(38)

Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.

(True/False)
5.0/5
(32)
Showing 61 - 80 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)