Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the actions that a firewall might take after examining a packet?

Free
(Essay)
4.9/5
(37)
Correct Answer:
Verified

After examining a packet,a firewall can take one of the following actions:
a.Reject the incoming packet.
b.Send a warning to the network administrator.
c.Send a message to the packet's sender that the attempt failed.
d.Allow the packet to enter (or leave) the private network.

If a drive in a redundant array of independent disks (RAID) system fails,data stored on it can be reconstructed from data stored on the remaining drives.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

The main function of Cyber Incident Response Capability (CIRT) is to:

(Multiple Choice)
4.8/5
(32)

A _____ is the software that acts as an intermediary between two systems.

(Multiple Choice)
4.7/5
(30)

_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.

(Short Answer)
4.8/5
(34)

In symmetric encryption,the same key is used to encrypt and decrypt a message.

(True/False)
4.7/5
(41)

Data sent through a virtual private network (VPN) can be encrypted using the _____ protocol.

(Multiple Choice)
4.7/5
(40)

A level 1 security system is used to protect _____ against unauthorized access.

(Multiple Choice)
4.8/5
(45)

_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.

(Multiple Choice)
4.7/5
(46)

The _____ biometric security measure translates words into digital patterns,which are recorded and examined for tone and pitch.

(Short Answer)
4.8/5
(35)

A(n) _____ encryption usually works better for public networks,such as the Internet.

(Multiple Choice)
4.9/5
(35)

A(n) _____ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

(Short Answer)
4.8/5
(35)

A logic bomb is a type of _____.

(Multiple Choice)
4.8/5
(33)

Explain the concept of mirror disks.

(Essay)
4.8/5
(28)

_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

(Multiple Choice)
4.7/5
(41)

In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.

(Multiple Choice)
4.8/5
(33)

What is an intrusion detection system (IDS)?

(Essay)
4.8/5
(39)

A(n) _____ contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.

(Short Answer)
4.8/5
(44)

Discuss the guidelines for improving a firewall's capabilities.

(Essay)
4.9/5
(40)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)