Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

(Short Answer)
4.8/5
(41)

When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.

(True/False)
4.8/5
(36)

The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.

(True/False)
4.9/5
(39)

_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

(Short Answer)
4.8/5
(34)

What is the function of a virtual private network (VPN)?

(Essay)
4.9/5
(41)

Symmetric encryption is also called public key encryption.

(True/False)
4.9/5
(40)

An intrusion detection system (IDS) can protect networks against both external and internal access.

(True/False)
4.9/5
(40)

Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.

(True/False)
4.7/5
(34)

In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

(Multiple Choice)
4.8/5
(21)

A _____ is a programming routine built into a system by its designer or programmer.

(Multiple Choice)
4.8/5
(37)

The cost of setting up a virtual private network (VPN) is usually high.

(True/False)
4.7/5
(44)

Which of the following is considered an intentional security threat?

(Multiple Choice)
4.8/5
(27)

_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.

(Multiple Choice)
4.9/5
(41)

Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

(True/False)
4.9/5
(32)

Hand geometry is an example of a biometric security measure.

(True/False)
4.8/5
(35)

When planning a comprehensive security system,the first step is designing _____,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

(Short Answer)
4.9/5
(41)

Corner bolts are an expensive way to secure a computer to a desktop or a counter.

(True/False)
4.9/5
(38)

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

(Multiple Choice)
4.9/5
(38)

When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.

(True/False)
4.9/5
(34)

_____ encryption uses a public key known to everyone and a private key known only to the recipient.

(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)