Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____________________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

(Short Answer)
4.8/5
(43)

When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.

(True/False)
4.8/5
(42)

____________________ means that a system must prevent disclosing information to anyone who is not authorized to access it.

(Short Answer)
4.9/5
(56)

____ are hackers who specialize in unauthorized penetration of information systems.

(Multiple Choice)
4.7/5
(37)

Describe how a blended threat works.

(Essay)
4.8/5
(36)

A(n)____ is often used so remote users have a secure connection to the organization's network.

(Multiple Choice)
4.9/5
(41)

Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.

(True/False)
4.8/5
(45)

____ is a commonly used encryption protocol that manages transmission security on the Internet.

(Multiple Choice)
5.0/5
(40)

What is shoulder surfing? Provide an example.

(Essay)
4.9/5
(31)

A ____ attack typically targets Internet servers.

(Multiple Choice)
4.9/5
(43)

The main function of the ____ model is to provide information on security incidents,including information systems' vulnerabilities,viruses,and malicious programs.

(Multiple Choice)
4.8/5
(30)

An ideal password should be eight characters or longer.

(True/False)
4.9/5
(40)

An intrusion detection system cannot prevent DoS attacks.

(True/False)
4.9/5
(36)

Trojans do not replicate themselves,as viruses and worms do.

(True/False)
4.8/5
(43)

Which of the following is a biometric security measure?

(Multiple Choice)
4.8/5
(38)

Level 2 security involves ____.

(Multiple Choice)
4.8/5
(44)

Data encryption transforms data into a scrambled form called ____.

(Multiple Choice)
4.8/5
(33)

In ____ encryption,the same key is used to encrypt and decrypt the message.

(Multiple Choice)
4.8/5
(30)

Black hats are also known as ethical hackers.

(True/False)
5.0/5
(42)

____ means that a system must prevent disclosing information to anyone who is not authorized to access it.

(Multiple Choice)
4.8/5
(33)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)