Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Code Red, Melissa, and Sasser are examples of _____ .

(Multiple Choice)
4.9/5
(25)

Summarize the seven steps an organization should follow in order to resume operations in the event of a disaster.

(Essay)
4.8/5
(42)

Social engineering is an attack that takes advantage of the backdoors in security systems.

(True/False)
4.7/5
(41)

Briefly list some of the indications of a computer being infected by a virus.

(Essay)
4.9/5
(35)

Briefly discuss how a worm can disrupt a computer or a network.

(Essay)
4.9/5
(37)

Which federal law requires IT professionals to test the effectiveness of security measures protecting a company's data and vital records?

(Multiple Choice)
4.7/5
(44)

Which of the following is not considered part of a comprehensive security plan?

(Multiple Choice)
4.8/5
(42)

Application-filtering firewalls are less expensive than packet-filtering firewalls.

(True/False)
4.9/5
(36)

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

(Multiple Choice)
4.8/5
(40)

A _____ is a type of an intentional computer and network threat.

(Multiple Choice)
4.9/5
(36)

In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

(Multiple Choice)
4.8/5
(40)

The Committee on National Security Systems (CNSS)proposed a model known as the _____ for evaluating information security.

(Multiple Choice)
4.9/5
(33)

In the event of disaster, organizations should document all actions taken to regain normality.

(True/False)
4.8/5
(27)

_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.

(Multiple Choice)
4.9/5
(27)

A hot site, an alternative site to use in case of disaster, does not have the necessary equipment to get up an running immediately.

(True/False)
4.8/5
(37)

_____ is a computer crime that involves destroying or disrupting computer services.

(Multiple Choice)
4.7/5
(25)

When developing a comprehensive security plan, employees' awareness of security problems should be minimized.

(True/False)
4.8/5
(36)

The top two targets for ransomware attacks are the __________.

(Multiple Choice)
4.9/5
(43)

In the context of biometric security measures, briefly describe some biometric devices and measures.

(Essay)
4.8/5
(36)

In the context of fault-tolerant systems, describe uninterruptible power supply (UPS).

(Essay)
4.8/5
(34)
Showing 101 - 120 of 122
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)