Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A proxy server acts as an intermediary between network users and the Internet.

(True/False)
4.9/5
(40)

The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.

(True/False)
4.7/5
(38)

Describe some of the steps that users should take to guard against data theft and data loss.

(Essay)
4.8/5
(35)

____ ensures data security and integrity over public networks,such as the Internet.

(Multiple Choice)
4.9/5
(34)

____________________ are inexperienced,usually young hackers who use programs that others have developed to attack computer and network systems.

(Short Answer)
4.9/5
(41)

When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.

(True/False)
4.8/5
(41)

The cost of setting up a virtual private network is usually high.

(True/False)
4.7/5
(34)

Describe the function of identification (ID)badges.

(Essay)
4.9/5
(37)

Explain the use of callback modems as a nonbiometric security measure.

(Essay)
4.8/5
(34)

____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

(Multiple Choice)
4.9/5
(35)

A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.

(Multiple Choice)
4.8/5
(35)

A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.

(True/False)
4.9/5
(37)

____ security measures use a physiological element to enhance security measures.

(Multiple Choice)
4.8/5
(38)

____________________ are independent programs that can spread themselves without having to be attached to a host program.

(Short Answer)
4.7/5
(36)

Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.

(Multiple Choice)
4.8/5
(29)

Part of ensuring integrity is identifying authorized users and granting them access privileges.

(True/False)
4.9/5
(36)

____________________ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

(Short Answer)
4.7/5
(32)

A ____ is an inexperienced,usually young hacker who uses programs that others have developed to attack computer and network systems.

(Multiple Choice)
4.7/5
(31)

A firewall cannot reject an incoming packet,but instead sends a warning to the network administrator.

(True/False)
4.8/5
(39)

Social engineering techniques are easily detectable because they involve threatening employees with physical violence.

(True/False)
4.8/5
(38)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)