Exam 17: Computer Security
Exam 1: The Big Picture52 Questions
Exam 2: Binary Values and Number Systems49 Questions
Exam 3: Data Representation51 Questions
Exam 4: Gates and Circuits49 Questions
Exam 5: Computing Components49 Questions
Exam 6: Low-Level Programming Languages and Pseudocode49 Questions
Exam 7: Problem Solving and Algorithms48 Questions
Exam 8: Abstract Data Types and Subprograms49 Questions
Exam 9: Object-Oriented Design and High-Level Programming Languages47 Questions
Exam 10: Operating Systems49 Questions
Exam 11: File Systems and Directories49 Questions
Exam 12: Information Systems45 Questions
Exam 13: Artificial Intelligence47 Questions
Exam 14: Simulation, Graphics, Gaming, and Other Applications50 Questions
Exam 15: Networks48 Questions
Exam 16: The World Wide Web44 Questions
Exam 17: Computer Security49 Questions
Exam 18: Limitations of Computing50 Questions
Exam 19: broad concept of computer security and its importance in modern society.102 Questions
Select questions type
Which of the following is not part of information security risk analysis?
(Multiple Choice)
4.9/5
(41)
Which of the following malware programs embeds a copy of itself in another program?
(Multiple Choice)
4.8/5
(37)
A digital signature is a way to "sign" a document by appending extra data that are both unique to the sender and very difficult to forge.
(True/False)
4.7/5
(33)
Malware known as a Trojan horse uses a system-oriented event to determine when it launches its attack.
(True/False)
4.9/5
(41)
The companies that make antivirus software are constantly updating their databases of signatures and heuristics to detect new malware.
(True/False)
4.9/5
(34)
Which of the following malware programs might launch its attack on the next April Fool's Day?
(Multiple Choice)
4.8/5
(37)
Phishing is a technique that uses a fake web page to collect information such as usernames and passwords.
(True/False)
4.8/5
(33)
Password management software should be evaluated and used with care, but may provide a good solution for the active user.
(True/False)
4.8/5
(36)
Which of the following is not used for user authentication?
(Multiple Choice)
4.7/5
(37)
Information security experts embrace the principle that no single individual should have the authority to have a significant impact on the system.
(True/False)
4.9/5
(38)
According to a 2018 report, what percentage of cyber-attacks target small businesses?
(Multiple Choice)
4.8/5
(33)
GPS and other location data available on cell phones are sometimes collected by corporate agencies and/or used by law enforcement to aid criminal investigations.
(True/False)
4.9/5
(31)
Which of the following ensures that data can be modified only by appropriate mechanisms?
(Multiple Choice)
5.0/5
(43)
A digital certificate is an authenticated public key kept for trusted sources in order to minimize forgeries.
(True/False)
4.7/5
(31)
Users should beware of any situation in which they are contacted and requested to provide security information.
(True/False)
4.9/5
(39)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)