Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements best describes spyware?

(Multiple Choice)
4.9/5
(42)

In the context of intentional computer and network threats, social engineers protects the integrity of information resources.

(True/False)
4.7/5
(37)

A(n)__________is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

(Multiple Choice)
4.9/5
(42)

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

(Multiple Choice)
4.8/5
(37)

Which of the following is a type of access control used to protect systems from unauthorized access?

(Multiple Choice)
4.9/5
(34)

In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

(Multiple Choice)
4.7/5
(32)

If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.

(True/False)
4.9/5
(35)

In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

(Multiple Choice)
4.9/5
(38)

Spoofing happens when:

(Multiple Choice)
4.8/5
(39)

In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.

(True/False)
4.8/5
(33)

Code Red, Melissa, and Sasser are examples of__________.

(Multiple Choice)
4.9/5
(40)

The cost of setting up a virtual private network (VPN) is usually high.

(True/False)
4.8/5
(30)

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

(Multiple Choice)
4.9/5
(41)

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

(Multiple Choice)
4.8/5
(35)

In the context of the common intentional security threats, which of the following statements best describes a worm?

(Multiple Choice)
4.8/5
(31)

__________is one of the most popular password managers.

(Multiple Choice)
4.8/5
(31)

A__________consists of self-propagating program code that is triggered by a specified time or event.

(Multiple Choice)
4.9/5
(35)

Which of the following statements is true of asymmetric encryption?

(Multiple Choice)
4.7/5
(38)

An intrusion detection system (IDS) can protect networks against both external and internal access.

(True/False)
4.9/5
(41)

When planning a comprehensive security system, the first step is designing__________, which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

(Multiple Choice)
4.9/5
(36)
Showing 41 - 60 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)