Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

D

Briefly discuss how a worm can disrupt a computer or a network.

Free
(Essay)
4.8/5
(32)
Correct Answer:
Verified

Answers will vary.A worm travels from computer to computer in a network, but it does not usually erase data.Unlike a virus, it is an independent program that can spread itself without having to be attached to a host program.It might corrupt data, but it usually replicates itself into a full-blown version that eats up computing resources, eventually bringing a computer or network to a halt.Well-known worms include Code Red, Melissa, and Sasser.Conficker, a recent worm, has infected millions of Windows computers.

Which of the following statements is true of phishing?

Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
Verified

B

_____is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data. ​

(Multiple Choice)
4.9/5
(42)

Which of the following statements best describes spyware?

(Multiple Choice)
4.8/5
(29)

An intrusion detection system (IDS) can protect networks against both external and internal access.

(True/False)
4.8/5
(34)

Data sent through a virtual private network (VPN) can be encrypted using the _____.

(Multiple Choice)
4.8/5
(33)

_____ is a computer crime that involves destroying or disrupting computer services.

(Multiple Choice)
4.9/5
(30)

Viruses can be transmitted through a network or through e-mail attachments.

(True/False)
4.9/5
(36)

The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.

(True/False)
4.7/5
(38)

Briefly discuss dumpster diving and shoulder surfing, two commonly used social-engineering techniques.

(Essay)
4.9/5
(34)

A _____consists of self-propagating program code that is triggered by a specified time or event. ​

(Multiple Choice)
4.9/5
(34)

Which of the following security measures uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?

(Multiple Choice)
4.9/5
(32)

When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.

(True/False)
4.8/5
(29)

In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:

(Multiple Choice)
4.9/5
(32)

_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.

(Multiple Choice)
5.0/5
(37)

Briefly explain an intrusion detection system (IDS).

(Essay)
4.9/5
(37)

A level 1 security system is used to protect _____ against unauthorized access.

(Multiple Choice)
4.9/5
(27)

Which of the following statements is true of a worm?

(Multiple Choice)
4.8/5
(37)

In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.

(True/False)
4.9/5
(30)
Showing 1 - 20 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)