Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?

(Multiple Choice)
4.9/5
(33)

In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.

(True/False)
4.9/5
(42)

A(n) _____ is often used so that remote users have a secure connection to an organization's network.

(Multiple Choice)
4.9/5
(32)

Data sent through a virtual private network (VPN) can be encrypted using the _____.

(Multiple Choice)
4.8/5
(37)

Viruses can be transmitted through a network or through e-mail attachments.

(True/False)
4.7/5
(37)

In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.

(Multiple Choice)
4.8/5
(39)

_____ is also known as secret key encryption.

(Multiple Choice)
4.9/5
(38)

As a physical security measure, _____.

(Multiple Choice)
4.8/5
(33)

Which of the following statements is true of phishing?

(Multiple Choice)
4.9/5
(35)

__________monitor and record the keys pressed on a keyboard and can be software or hardware devices.

(Multiple Choice)
4.9/5
(26)

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

(Multiple Choice)
4.8/5
(29)

Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.

(True/False)
4.8/5
(40)

__________, a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.

(Multiple Choice)
4.9/5
(41)

The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.

(Multiple Choice)
4.8/5
(44)

Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

(True/False)
4.8/5
(31)

A _____ is a type of an intentional computer and network threat.

(Multiple Choice)
4.9/5
(35)

The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.

(True/False)
4.8/5
(37)

In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.

(Multiple Choice)
4.9/5
(36)

In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.

(Multiple Choice)
4.9/5
(40)

_____, a recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.

(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)