Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ encryption usually works better for public networks,such as the Internet.

(Multiple Choice)
4.9/5
(37)

_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.

(Multiple Choice)
4.9/5
(27)

_________ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

(Multiple Choice)
4.8/5
(31)

To ensure confidentiality,accuracy,and integrity of data,a level 2 security system protects _____.

(Multiple Choice)
4.9/5
(34)

A _____ travels from computer to computer in a network but it does not usually erase data.

(Multiple Choice)
4.9/5
(34)

The cost of setting up a virtual private network (VPN)is usually high.

(True/False)
4.9/5
(36)

What is the McCumber cube?

(Essay)
4.9/5
(34)

In data encryption,the https indicates a safe HTTP connection over _____.

(Multiple Choice)
4.8/5
(38)

Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

(True/False)
5.0/5
(33)

Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.

(Multiple Choice)
4.7/5
(29)

_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.

(Multiple Choice)
4.8/5
(32)

Viruses can only be transmitted through sharing of infected files directly from one computer to another.

(True/False)
4.8/5
(38)

Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.

(True/False)
4.7/5
(36)

A level 3 security system focuses on protecting _____ against intrusion,denial-of-service attacks,and unauthorized access.

(Multiple Choice)
4.9/5
(30)

_____ is the process of capturing and recording network traffic.

(Multiple Choice)
4.9/5
(35)

In data encryption,_____ ensures data security and integrity over public networks,such as the Internet.

(Multiple Choice)
4.8/5
(40)

What is Spyware?

(Multiple Choice)
4.9/5
(34)

A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.

(True/False)
5.0/5
(36)

_________ is a form of spyware that collects information about a user (without the user's consent)to determine which advertisements to display in the user's Web browser.

(Multiple Choice)
4.8/5
(32)

A(n)_____ is often used so remote users have a secure connection to an organization's network.

(Multiple Choice)
4.8/5
(32)
Showing 41 - 60 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)