Exam 5: Protecting Information Resources
Exam 1: Information Systems: an Overview100 Questions
Exam 2: Computers: the Machines Behind Computing100 Questions
Exam 3: Database Systems,data Warehouses,and Data Marts104 Questions
Exam 4: Personal,legal,ethical,and Organizational Issues of Information Systems100 Questions
Exam 5: Protecting Information Resources100 Questions
Exam 6: Data Communication: Delivering Information Anywhere and Anytime100 Questions
Exam 7: The Internet,intranets,and Extranets101 Questions
Exam 8: E-Commerce101 Questions
Exam 9: Global Information Systems102 Questions
Exam 10: Building Successful Information Systems100 Questions
Exam 11: Enterprise Systems98 Questions
Exam 12: Management Support Systems100 Questions
Exam 13: Intelligent Information Systems101 Questions
Exam 14: Emerging Trends,technologies,and Applications100 Questions
Select questions type
What are the actions that a firewall might take after examining a packet?
Free
(Essay)
4.9/5
(37)
Correct Answer:
After examining a packet,a firewall can take one of the following actions:
a.Reject the incoming packet.
b.Send a warning to the network administrator.
c.Send a message to the packet's sender that the attempt failed.
d.Allow the packet to enter (or leave) the private network.
If a drive in a redundant array of independent disks (RAID) system fails,data stored on it can be reconstructed from data stored on the remaining drives.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
The main function of Cyber Incident Response Capability (CIRT) is to:
(Multiple Choice)
4.8/5
(32)
A _____ is the software that acts as an intermediary between two systems.
(Multiple Choice)
4.7/5
(30)
_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.
(Short Answer)
4.8/5
(34)
In symmetric encryption,the same key is used to encrypt and decrypt a message.
(True/False)
4.7/5
(41)
Data sent through a virtual private network (VPN) can be encrypted using the _____ protocol.
(Multiple Choice)
4.7/5
(40)
A level 1 security system is used to protect _____ against unauthorized access.
(Multiple Choice)
4.8/5
(45)
_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.
(Multiple Choice)
4.7/5
(46)
The _____ biometric security measure translates words into digital patterns,which are recorded and examined for tone and pitch.
(Short Answer)
4.8/5
(35)
A(n) _____ encryption usually works better for public networks,such as the Internet.
(Multiple Choice)
4.9/5
(35)
A(n) _____ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
(Short Answer)
4.8/5
(35)
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
(Multiple Choice)
4.7/5
(41)
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.
(Multiple Choice)
4.8/5
(33)
A(n) _____ contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.
(Short Answer)
4.8/5
(44)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)