Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

After examining an incoming packet,a firewall cannot reject that packet.

(True/False)
4.7/5
(35)

Which of the following is considered an intentional security threat?

(Multiple Choice)
4.7/5
(33)

In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.

(Multiple Choice)
4.8/5
(32)

Social engineering is an example of an unintentional security threat.

(True/False)
4.8/5
(39)

_____ encryption uses a public key known to everyone and a private key known only to the recipient.​

(Multiple Choice)
4.8/5
(27)

An ideal password should be eight characters or longer.

(True/False)
4.7/5
(38)

When planning a comprehensive security system,the first step is designing _________,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

(Multiple Choice)
4.9/5
(25)

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

(Multiple Choice)
4.9/5
(32)

The Committee on National Security Systems (CNSS)proposed another model for evaluating information security known as the _____.

(Multiple Choice)
4.9/5
(36)

Which of the following is true of a worm?

(Multiple Choice)
4.8/5
(28)

When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.

(True/False)
4.9/5
(29)

_____ is an example of a biometric security measure.

(Multiple Choice)
4.9/5
(37)

_________ is software that secretly gathers information about users while they browse the Web.

(Multiple Choice)
4.8/5
(39)

In the context of security threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

(Multiple Choice)
4.9/5
(33)

Discuss the guidelines for improving a firewall's capabilities.

(Essay)
4.8/5
(29)

Explain the use of callback modems as a nonbiometric security measure.

(Essay)
4.9/5
(32)

_________ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

(Multiple Choice)
4.9/5
(41)

How is a sender notified of packet delivery using a packet-filtering firewall?

(Essay)
4.9/5
(44)

In the context of security,social engineering protects the integrity of information resources.

(True/False)
4.7/5
(40)

_________ are independent programs that can spread themselves without having to be attached to a host program.

(Multiple Choice)
4.8/5
(40)
Showing 61 - 80 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)