Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Symmetric encryption is also called public key encryption.

(True/False)
4.8/5
(39)

What is the function of a virtual private network (VPN)?

(Essay)
4.8/5
(47)

A ____ plan lists the tasks that must be performed to restore damaged data and equipment.

(Multiple Choice)
5.0/5
(50)

An intrusion detection system can protect against both external and internal access.

(True/False)
4.8/5
(36)

A(n)____ is software that acts as an intermediary between two systems.

(Multiple Choice)
4.7/5
(32)

What is an intrusion detection system (IDS)?

(Essay)
4.8/5
(31)

____________________ means that computers and networks are operating and authorized users can access the information they need.

(Short Answer)
4.8/5
(38)

In symmetric encryption,the same key is used to encrypt and decrypt the message.

(True/False)
4.8/5
(31)

Which of the following is considered an intentional threat?

(Multiple Choice)
4.8/5
(30)

Discuss guidelines for improving a firewall's capabilities.

(Essay)
5.0/5
(43)

What are the actions that a firewall might take after examining a packet?

(Essay)
4.8/5
(29)

What is the McCumber cube?

(Essay)
4.9/5
(40)

____ encryption uses a public key known to everyone and a private key known only to the recipient.

(Multiple Choice)
4.8/5
(35)

A logic bomb is a type of ____.

(Multiple Choice)
4.8/5
(38)

Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.

(True/False)
4.9/5
(36)

The ____________________ biometric security method translates words into digital patterns,which are recorded and examined for tone and pitch.

(Short Answer)
4.8/5
(41)

____ refers to the accuracy of information resources within an organization.

(Multiple Choice)
4.9/5
(46)

Which of the following is a physical security measure?

(Multiple Choice)
4.8/5
(28)

Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

(True/False)
4.8/5
(40)

Corner bolts are secured to a computer at the power outlet.

(True/False)
4.8/5
(32)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)