Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Trojan programs replicate themselves as viruses and worms do.

(True/False)
4.9/5
(44)

An intrusion detection system (IDS) cannot prevent denial-of-service (DoS) attacks.

(True/False)
4.9/5
(45)

_____ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.

(Short Answer)
4.8/5
(27)

A(n) _____ is often used,so remote users have a secure connection to an organization's network.

(Multiple Choice)
4.9/5
(41)

How are computer viruses transmitted? Where do the most dangerous one come from and what viruses pose the most risk to national security?

(Essay)
4.9/5
(38)

What is shoulder surfing? Provide an example.

(Essay)
4.9/5
(38)

How does a worm disrupt computing services?

(Essay)
4.9/5
(39)

Describe how uninterruptible power supply (UPS) is used as part of a comprehensive security system.

(Essay)
4.8/5
(43)

Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

(True/False)
4.9/5
(38)

A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.

(True/False)
4.7/5
(40)

_____ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

(Short Answer)
4.8/5
(35)

Which of the following is a biometric security measure?

(Multiple Choice)
4.8/5
(45)

_____ are independent programs that can spread themselves without having to be attached to a host program.

(Short Answer)
4.8/5
(36)

A _____ plan lists the tasks that must be performed to restore damaged data and equipment.

(Multiple Choice)
4.7/5
(41)

Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.

(Multiple Choice)
4.9/5
(38)

_____ is the process of capturing and recording network traffic.

(Multiple Choice)
4.9/5
(39)

How are identification (ID) badges used as a physical security measure against thefts?

(Essay)
4.9/5
(42)

Social engineering is an example of an unintentional security threat.

(True/False)
4.8/5
(43)

Social engineering is an attack that takes advantage of the backdoors in security systems.

(True/False)
4.8/5
(38)

List nine types of intentional computer and network threats.

(Essay)
4.8/5
(41)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)