Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

(True/False)
4.7/5
(37)

In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.

(Multiple Choice)
4.8/5
(35)

Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.

(True/False)
4.9/5
(38)

In the context of biometric security measures, briefly describe some biometric devices and measures.

(Essay)
4.8/5
(29)

A(n) _____is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks. ​

(Multiple Choice)
4.8/5
(38)

_____is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.monitor and record the keys pressed on a keyboard and can be software or hardware devices. ​

(Multiple Choice)
4.8/5
(33)

As a physical security measure, _____.

(Multiple Choice)
4.8/5
(31)

In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.

(Multiple Choice)
4.9/5
(45)

Application-filtering firewalls are less expensive than packet-filtering firewalls.

(True/False)
4.7/5
(40)

Briefly list some of the indications of a computer being infected by a virus.

(Essay)
4.8/5
(43)

John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.

(Multiple Choice)
4.8/5
(31)

_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.

(Multiple Choice)
4.8/5
(32)

In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.

(Multiple Choice)
4.8/5
(35)

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

(True/False)
4.9/5
(37)

The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.

(Multiple Choice)
4.7/5
(35)

Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

(Multiple Choice)
4.9/5
(38)

_____is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser. ​

(Multiple Choice)
4.9/5
(34)

A _____is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address. ​

(Multiple Choice)
4.9/5
(33)

In the context of data encryption, briefly describe asymmetric encryption.

(Essay)
4.8/5
(37)

In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.

(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)