Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____is an example of antispyware software. ​

(Multiple Choice)
4.9/5
(36)

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

(Multiple Choice)
4.9/5
(43)

Explain the use of callback modems as a nonbiometric security measure.

(Essay)
4.8/5
(27)

In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

(Multiple Choice)
4.8/5
(41)

The process of capturing and recording network traffic is referred to as _____.

(Multiple Choice)
4.9/5
(32)

_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.

(Multiple Choice)
4.7/5
(38)

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

(Multiple Choice)
4.8/5
(41)

In the context of access controls, briefly explain the guidelines that need to be followed to increase the effectiveness of passwords.

(Essay)
4.9/5
(43)

Code Red, Melissa, and Sasser are examples of _____. ​

(Multiple Choice)
4.9/5
(44)

Which of the following statements is true of asymmetric encryption?

(Multiple Choice)
4.7/5
(42)

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

(Multiple Choice)
4.8/5
(30)

In the context of the common intentional security threats, which of the following statements best describes a worm?

(Multiple Choice)
4.9/5
(36)

Describe the three levels of security in a comprehensive security system.

(Essay)
4.9/5
(44)

The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.

(True/False)
4.8/5
(36)

Which of the following forms of text needs to be unscrambled using a decryption key?

(Multiple Choice)
4.8/5
(35)

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

(True/False)
4.7/5
(32)

_____is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account. ​

(Multiple Choice)
4.8/5
(41)

Which of the following is a nonbiometric security measure?

(Multiple Choice)
4.9/5
(28)

In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.

(Multiple Choice)
4.9/5
(30)

When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.

(True/False)
4.8/5
(37)
Showing 21 - 40 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)