Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the context of intentional computer and network threats, social engineers protects the integrity of information resources.

(True/False)
4.9/5
(34)

When a computer is infected by a virus, _____.

(Multiple Choice)
4.9/5
(41)

In the context of security, _____ is an attack that takes advantage of the human element of security systems.

(Multiple Choice)
4.9/5
(35)

Describe how a virtual private network (VPN) works.

(Essay)
4.8/5
(39)

Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?

(Multiple Choice)
4.9/5
(31)

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

(True/False)
4.9/5
(39)

In the context of intentional computer and network threats, describe how blended threats work.

(Essay)
4.7/5
(37)

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

(Multiple Choice)
4.9/5
(29)

_____ uses a public key known to everyone and a private key known only to the recipient.

(Multiple Choice)
4.7/5
(33)

When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure. ​

(Multiple Choice)
4.8/5
(33)

Discuss the guidelines for improving a firewall's capabilities.

(Essay)
4.9/5
(39)

_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.

(Multiple Choice)
4.8/5
(30)

Briefly explain the McCumber cube.

(Essay)
4.9/5
(30)

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

(Multiple Choice)
4.8/5
(38)

In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.

(True/False)
4.8/5
(33)

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

(Multiple Choice)
4.8/5
(31)

In the context of fault-tolerant systems, describe uninterruptible power supply (UPS).

(Essay)
4.9/5
(34)

In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.

(Multiple Choice)
4.8/5
(27)

Which of the following statements is true of application-filtering firewalls?

(Multiple Choice)
4.8/5
(30)

List the actions that a firewall can take after examining a packet.

(Essay)
4.7/5
(28)
Showing 41 - 60 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)