Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) _____ consists of self-propagating program code that is triggered by a specified time or event.

(Short Answer)
5.0/5
(39)

_____ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

(Short Answer)
4.9/5
(27)

A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.

(True/False)
5.0/5
(41)

Viruses can only be transmitted through sharing of infected files directly from one computer to another.

(True/False)
4.8/5
(33)

_____ ensures data security and integrity over public networks,such as the Internet.

(Multiple Choice)
4.9/5
(31)

Backup facilities should never be shared in an attempt to reduce costs.

(True/False)
4.9/5
(37)

State any five physical security measures.

(Essay)
4.8/5
(44)

Which of the following is a nonbiometric security measure?

(Multiple Choice)
4.8/5
(43)

Which of the following is a type of access control used to protect systems from unauthorized access?

(Multiple Choice)
4.9/5
(37)

_____ take advantage of the human element of security systems.

(Multiple Choice)
4.8/5
(33)

_____ is a computer crime that involves destroying or disrupting computer services.

(Multiple Choice)
4.9/5
(44)

Data encryption transforms data into a scrambled form called ciphertext.

(True/False)
4.8/5
(37)

Explain the use of callback modems as a nonbiometric security measure.

(Essay)
4.9/5
(36)

Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.

(True/False)
4.9/5
(38)

In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.

(Multiple Choice)
4.8/5
(37)

Describe asymmetric encryption.

(Essay)
4.9/5
(27)

An ideal password should be eight characters or longer.

(True/False)
4.7/5
(33)

A level 3 security system focuses on protecting _____.

(Multiple Choice)
4.7/5
(32)

What are the functions of a computer emergency response team (CERT)?

(Essay)
4.7/5
(28)

How is a sender notified of packet delivery using a packet-filtering firewall?

(Essay)
4.9/5
(43)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)