Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?

(Multiple Choice)
4.9/5
(36)

Briefly explain how packet-filtering firewalls work.

(Essay)
4.7/5
(40)

List the different types of intentional computer and network security threats.

(Essay)
4.8/5
(26)

Briefly discuss the process of data encryption.

(Essay)
4.8/5
(31)

_____is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. ​

(Multiple Choice)
4.8/5
(29)

A(n) _____contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program. ​

(Multiple Choice)
4.9/5
(41)

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

(Multiple Choice)
4.7/5
(27)

Which of the following is a type of access control used to protect systems from unauthorized access?

(Multiple Choice)
4.8/5
(34)

In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.

(Multiple Choice)
4.9/5
(35)
Showing 101 - 109 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)