Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the context of security threats,_____ takes advantage of the human element of security systems.

(Multiple Choice)
4.7/5
(34)

Describe how blended threats work.

(Essay)
4.8/5
(35)

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

(Multiple Choice)
4.7/5
(33)

​In _____ encryption,the same key is used to encrypt and decrypt a message.

(Multiple Choice)
4.8/5
(35)

When does spoofing occur?

(Multiple Choice)
4.8/5
(38)

_____ is a computer crime that involves destroying or disrupting computer services.

(Multiple Choice)
5.0/5
(36)

How are identification (ID)badges used as a physical security measure against thefts?

(Short Answer)
4.7/5
(32)

A _________ consists of self-propagating program code that is triggered by a specified time or event.

(Multiple Choice)
4.8/5
(33)

Which of the following is a nonbiometric security measure?

(Multiple Choice)
4.9/5
(37)

In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.

(Multiple Choice)
4.9/5
(30)

When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.

(True/False)
4.8/5
(32)

A(n)_________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

(Multiple Choice)
4.7/5
(40)

In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

(Multiple Choice)
4.8/5
(39)

List nine types of intentional computer and network threats.

(Essay)
4.8/5
(35)

Which of the following is true of application-filtering firewalls?

(Multiple Choice)
4.8/5
(30)

Describe asymmetric encryption.

(Essay)
4.8/5
(33)

The main function of Cyber Incident Response Capability (CIRC)is to _____.

(Multiple Choice)
4.9/5
(41)

Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.

(True/False)
4.9/5
(35)

In data encryption,a(n)_____ enables users of the Internet to securely and privately exchange data through the use of a pair of keys.

(Multiple Choice)
4.8/5
(35)

In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.

(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)