Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a physical security measure?

(Multiple Choice)
4.8/5
(36)

Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.

(True/False)
4.8/5
(39)

A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system.

(Multiple Choice)
4.9/5
(37)

After examining an incoming packet,a firewall cannot reject that packet.

(True/False)
4.8/5
(35)

Describe the process of vein analysis in biometric security measures.

(Essay)
4.9/5
(40)

_____ use a physiological element to enhance security measures.

(Multiple Choice)
4.8/5
(39)

In the context of security,_____ means using "people skills"-such as being a good listener and assuming a friendly,unthreatening air-to trick others into revealing private information.

(Short Answer)
4.8/5
(28)

In the context of security,social engineering protects the integrity of information resources.

(True/False)
4.8/5
(34)

_____ is software that secretly gathers information about users while they browse the Web.

(Short Answer)
4.9/5
(37)

Part of ensuring integrity is identifying authorized users and granting them access privileges.

(True/False)
4.7/5
(40)

Describe how blended threats work.

(Essay)
4.9/5
(36)

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

(Multiple Choice)
4.8/5
(41)

A level 2 security system protects _____.

(Multiple Choice)
4.7/5
(32)

Application-filtering firewalls are less expensive than packet-filtering firewalls.

(True/False)
4.8/5
(39)

_____ is a form of spyware that collects information about a user (without the user's consent) to determine which advertisements to display in the user's Web browser.

(Short Answer)
4.8/5
(30)

What is data encryption?

(Essay)
4.8/5
(33)

Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?

(Multiple Choice)
4.9/5
(36)

What is the McCumber cube?

(Essay)
4.8/5
(39)

A (n) _____ travels from computer to computer in a network,but it does not usually erase data.

(Multiple Choice)
4.9/5
(36)

In _____ encryption,the same key is used to encrypt and decrypt a message.

(Multiple Choice)
4.8/5
(39)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)