Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

D

An intrusion detection system (IDS)can protect networks against both external and internal access.

Free
(True/False)
4.9/5
(31)
Correct Answer:
Verified

True

Identify an intentional security threat that is a type of Trojan program used to release a virus,worm,or other destructive code.

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

A

Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

(True/False)
4.9/5
(43)

Social engineering is an attack that takes advantage of the backdoors in security systems.

(True/False)
4.7/5
(37)

Which of the following is a biometric security measure?

(Multiple Choice)
5.0/5
(47)

What is shoulder surfing? Provide an example.

(Essay)
4.7/5
(41)

Which of the following is a physical security measure?

(Multiple Choice)
4.9/5
(30)

A(n)_________ program contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.

(Multiple Choice)
5.0/5
(35)

_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

(Multiple Choice)
4.7/5
(42)

State any five physical security measures.

(Essay)
4.8/5
(35)

Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.

(True/False)
4.8/5
(37)

In business continuity planning,a disaster recovery plan lists that backup facilities should never be shared in an attempt to reduce costs.

(True/False)
4.9/5
(23)

An intrusion detection system (IDS)cannot prevent denial-of-service (DoS)attacks.

(True/False)
4.8/5
(32)

_________ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.

(Multiple Choice)
4.8/5
(35)

In the context of security threats,a _____ is a programming routine built into a system by its designer or programmer.

(Multiple Choice)
4.8/5
(33)

Application-filtering firewalls are less expensive than packet-filtering firewalls.

(True/False)
5.0/5
(35)

Which of the following indicates that a computer might be affected by a virus?

(Multiple Choice)
4.7/5
(38)

How are computer viruses transmitted? Where do the most dangerous ones come from and what viruses pose the most risk to national security?

(Essay)
4.9/5
(38)

Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?

(Multiple Choice)
4.9/5
(27)
Showing 1 - 20 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)