Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.

(Multiple Choice)
4.8/5
(36)

_____, a recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.

(Multiple Choice)
4.8/5
(39)

A(n) _____ is often used so that remote users have a secure connection to an organization's network.

(Multiple Choice)
4.7/5
(42)

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

(Multiple Choice)
4.7/5
(34)

_____, a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch. ​

(Multiple Choice)
4.8/5
(33)

_____is used to encrypt the data sent through a virtual private network (VPN). ​

(Multiple Choice)
4.9/5
(44)

Spoofing happens when:

(Multiple Choice)
4.8/5
(37)

If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.

(True/False)
4.7/5
(36)

In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.

(True/False)
4.8/5
(46)

Discuss the functions of the Computer Emergency Response Team (CERT).

(Essay)
4.9/5
(37)

Which of the following statements is true of symmetric encryption?

(Multiple Choice)
4.9/5
(37)

Social engineering is an attack that takes advantage of the backdoors in security systems.

(True/False)
4.9/5
(34)

Explain how proximity-release door openers are used as a physical security measure to control access to computers and networks.

(Essay)
4.9/5
(39)

The main function of Cyber Incident Response Capability (CIRC) is to _____.

(Multiple Choice)
4.8/5
(28)

_____ is also known as secret key encryption.

(Multiple Choice)
4.8/5
(34)

Which of the following statements is true of firewalls?

(Multiple Choice)
4.8/5
(36)

_____is one of the most popular password managers. ​

(Multiple Choice)
4.9/5
(42)

A _____ is a type of an intentional computer and network threat.

(Multiple Choice)
4.9/5
(39)

Which of the following is a biometric security measure?

(Multiple Choice)
4.8/5
(39)

The cost of setting up a virtual private network (VPN) is usually high.

(True/False)
4.8/5
(31)
Showing 81 - 100 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)