Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.

(Multiple Choice)
4.8/5
(40)

Which of the following statements is true of a worm?

(Multiple Choice)
4.8/5
(43)

In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.

(Multiple Choice)
4.8/5
(33)

A(n)__________contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.

(Multiple Choice)
4.8/5
(41)

A__________is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.

(Multiple Choice)
4.9/5
(36)

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

(True/False)
4.8/5
(36)

__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.

(Multiple Choice)
4.9/5
(39)

When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.

(True/False)
4.9/5
(39)

_____ is a computer crime that involves destroying or disrupting computer services.

(Multiple Choice)
4.9/5
(43)

Which of the following security measures uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?

(Multiple Choice)
4.8/5
(46)

__________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.

(Multiple Choice)
4.8/5
(33)

Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?

(Multiple Choice)
4.7/5
(49)

_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.

(Multiple Choice)
4.7/5
(35)

The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.

(True/False)
4.8/5
(46)

Which of the following statements is true of firewalls?

(Multiple Choice)
4.7/5
(28)

The process of capturing and recording network traffic is referred to as _____.

(Multiple Choice)
4.8/5
(34)

_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.

(Multiple Choice)
4.8/5
(35)

__________is an example of antispyware software.

(Multiple Choice)
4.8/5
(35)

_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.

(Multiple Choice)
4.9/5
(34)

__________is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.

(Multiple Choice)
4.9/5
(38)
Showing 61 - 80 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)