Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.

(Multiple Choice)
4.7/5
(21)

In the context of security, _____ is an attack that takes advantage of the human element of security systems.

(Multiple Choice)
4.9/5
(37)

Which statement is true of asymmetric encryption?

(Multiple Choice)
5.0/5
(33)

The process of capturing and recording network traffic is referred to as _____.

(Multiple Choice)
4.8/5
(33)

_____, a more recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.

(Multiple Choice)
4.8/5
(34)

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

(Multiple Choice)
4.7/5
(39)

Spoofing happens when:

(Multiple Choice)
4.8/5
(38)

In the context of the common intentional security threats, which statement best describes a worm?

(Multiple Choice)
4.8/5
(30)

_____  is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

(Multiple Choice)
4.8/5
(35)

A level 1 security system is used to protect _____ against unauthorized access.

(Multiple Choice)
4.8/5
(37)

Which statement is true of phishing?

(Multiple Choice)
4.8/5
(37)

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

(Multiple Choice)
4.9/5
(32)

Which of the following is recommended in the context of a comprehensive security plan?

(Multiple Choice)
4.8/5
(42)

In the context of intentional computer and network threats, describe how blended threats work.

(Essay)
4.8/5
(33)

In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:

(Multiple Choice)
4.9/5
(36)

In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.

(True/False)
5.0/5
(36)

The main function of Cyber Incident Response Capability (CIRC)is to _____.

(Multiple Choice)
4.7/5
(34)

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

(Multiple Choice)
4.8/5
(34)

In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

(Multiple Choice)
4.8/5
(34)

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

(Multiple Choice)
4.8/5
(24)
Showing 81 - 100 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)