Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is a programming routine built into a system by its designer or programmer.

(Multiple Choice)
5.0/5
(35)

Typically,an organization leases the media used for a VPN on a(n)____ basis.

(Multiple Choice)
5.0/5
(37)

Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

(True/False)
4.9/5
(36)

____________________ ensure availability in the event of a system failure by using a combination of hardware and software.

(Short Answer)
4.9/5
(45)

A(n)____________________ is software that acts as an intermediary between two systems.

(Short Answer)
4.8/5
(36)

____ take advantage of the human element of security systems.

(Multiple Choice)
4.9/5
(38)

What are mirror disks?

(Essay)
4.8/5
(30)

Backup facilities should never be shared in an attempt to reduce costs.

(True/False)
4.9/5
(34)

Social engineering takes advantage of the human element of security systems.

(True/False)
4.8/5
(38)

A(n)____________________ consists of self-propagating program code that is triggered by a specified time or event.

(Short Answer)
4.8/5
(45)

What is symmetric encryption?

(Essay)
4.9/5
(41)

____________________ is an attack that takes advantage of the human element of security systems.

(Short Answer)
4.8/5
(37)

List at least four types of intentional computer and network threats.

(Essay)
4.8/5
(45)

____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.

(Multiple Choice)
4.8/5
(40)

What does a worm do during its attack?

(Essay)
4.8/5
(37)

What is the purpose of business continuity planning?

(Essay)
4.8/5
(38)

Social engineering is an example of an unintentional security threat.

(True/False)
4.9/5
(37)

In ____________________ encryption,the same key is used to encrypt and decrypt the message.

(Short Answer)
4.8/5
(40)

____ means that computers and networks are operating and authorized users can access the information they need.

(Multiple Choice)
4.8/5
(39)

How are computer viruses transmitted? Where do the most dangerous one come from and what viruses pose the most risk to network security?

(Essay)
4.7/5
(36)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)