Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a biometric security measure?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

D

When a computer is infected by a virus, _____.

Free
(Multiple Choice)
4.7/5
(47)
Correct Answer:
Verified

C

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

True

In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.

(Multiple Choice)
4.9/5
(39)

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

(Multiple Choice)
4.9/5
(28)

Which of the following statements is true of application-filtering firewalls?

(Multiple Choice)
4.8/5
(46)

_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.

(Multiple Choice)
4.8/5
(37)

__________is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

(Multiple Choice)
4.9/5
(34)

In the context of security, _____ is an attack that takes advantage of the human element of security systems.

(Multiple Choice)
5.0/5
(36)

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

(Multiple Choice)
4.7/5
(34)

In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.

(True/False)
4.8/5
(46)

Application-filtering firewalls are less expensive than packet-filtering firewalls.

(True/False)
4.8/5
(38)

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

(True/False)
4.8/5
(34)

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

(Multiple Choice)
4.7/5
(46)

_____ uses a public key known to everyone and a private key known only to the recipient.

(Multiple Choice)
4.9/5
(25)

A level 1 security system is used to protect _____ against unauthorized access.

(Multiple Choice)
4.8/5
(34)

Which of the following is a nonbiometric security measure?

(Multiple Choice)
4.8/5
(41)

Social engineering is an attack that takes advantage of the backdoors in security systems.

(True/False)
4.8/5
(37)

When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.

(True/False)
4.8/5
(45)

In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)