Exam 6: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT an objective of risk management?

(Multiple Choice)
4.9/5
(29)

MTBF measures the security risks of a computer system.

(True/False)
4.8/5
(40)

A(n)____________________ attack helps hackers guess your password by stepping through a list of thousands of the most common passwords.

(Short Answer)
5.0/5
(41)

  Publications like the one shown above help risk management professionals design and update disaster recovery plans. Publications like the one shown above help risk management professionals design and update disaster recovery plans.

(True/False)
4.8/5
(39)

A security suite typically includes ____.

(Multiple Choice)
4.7/5
(38)

____ involves writing specific symbols on walls, sidewalks, or lampposts to signal others they can tap into a wireless network in the area.

(Multiple Choice)
4.9/5
(29)

You have just been hired as an assistant to the network administrator at a local company. You are asked to give a presentation on viruses, worms, bots, Trojans, and spyware and include the unauthorized activities the network might see if malware enters the company's network. A coworker contacts you to inspect the computer in her office. She suspects that it is infected with malware. What steps will you take?

(Essay)
4.7/5
(16)

A(n)virus ____ is a section of program code that can be used to identify a known malicious program.

(Multiple Choice)
4.7/5
(35)

Which of the following is a common source of viruses?

(Multiple Choice)
4.8/5
(28)

List five symptoms of a computer infected with malware.

(Essay)
4.8/5
(34)

You do not have to click anything to receive a third-party cookie generated by a ____.

(Multiple Choice)
4.8/5
(38)

A boot disk contains a complete copy of your computer's hard disk as it existed when shipped from the manufacturer.

(True/False)
4.9/5
(34)

One of email's main disadvantages is spam.

(True/False)
4.9/5
(39)

Worms attach themselves to a file, reproduce, and spread to other files on the same computer.

(True/False)
4.8/5
(40)

A firewall is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer.

(True/False)
4.8/5
(35)

UPS stands for ____.

(Multiple Choice)
4.8/5
(35)

  Which of the following statements it NOT true about the figure shown above? Which of the following statements it NOT true about the figure shown above?

(Multiple Choice)
4.8/5
(32)

  A security suite , which integrates several security modules, is shown in the figure above. A security suite , which integrates several security modules, is shown in the figure above.

(True/False)
4.8/5
(36)

Antivirus software is available for ____.

(Multiple Choice)
4.8/5
(33)

  Item ____ in the figure above indicates an open (available)node. Item ____ in the figure above indicates an open (available)node.

(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)