Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Viruses can only be transmitted through direct computer-to-computer contact.

Free
(True/False)
4.9/5
(44)
Correct Answer:
Verified

False

If a drive in the RAID system fails,data stored on it can be reconstructed from data stored on the remaining drives.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

True

How is the sender notified of packet delivery using a packet-filtering firewall?

Free
(Essay)
4.8/5
(33)
Correct Answer:
Verified

A packet-filtering firewall informs senders if packets are rejected but does nothing if packets are dropped; senders have to wait until their requests time out to learn that the packets they sent were not received.

Level 3 security involves ____.

(Multiple Choice)
4.8/5
(28)

Level 1 security involves ____.

(Multiple Choice)
4.9/5
(43)

A worm travels from computer to computer in a network,but it does not usually erase data.

(True/False)
4.9/5
(45)

____________________ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

(Short Answer)
4.8/5
(41)

Describe asymmetric encryption.

(Essay)
4.9/5
(32)

____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

(Multiple Choice)
4.7/5
(38)

Hand geometry is an example of a biometric security measure.

(True/False)
4.8/5
(36)

A ____ travels from computer to computer in a network,but it does not usually erase data.

(Multiple Choice)
4.8/5
(34)

A(n)____________________ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

(Short Answer)
4.9/5
(29)

Which of the following is a nonbiometric security measure?

(Multiple Choice)
4.8/5
(32)

Data encryption transforms data into a scrambled form called ciphertext.

(True/False)
4.8/5
(38)

Which of the following is a type of access control?

(Multiple Choice)
4.9/5
(33)

State any five physical security measures.

(Essay)
4.9/5
(36)

Describe the vein analysis measure of biometric security.

(Essay)
4.8/5
(38)

A(n)____________________ contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.

(Short Answer)
4.8/5
(33)

Application-filtering firewalls are less expensive than packet-filtering firewalls.

(True/False)
4.9/5
(40)

____ is the process of capturing and recording network traffic.

(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)