Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.

(Multiple Choice)
4.8/5
(33)

Explain the concept of mirror disks.

(Essay)
4.8/5
(20)

Data sent through a virtual private network (VPN)can be encrypted using the _____.

(Multiple Choice)
4.7/5
(37)

In the context of security threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

(Multiple Choice)
4.8/5
(46)

What is the function of a virtual private network (VPN)?

(Essay)
4.9/5
(34)

Identify a true statement about firewalls.

(Multiple Choice)
4.7/5
(26)

_________ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

(Multiple Choice)
4.8/5
(31)

In the context of the CIA triangle,part of ensuring integrity is identifying authorized users and granting them access privileges.

(True/False)
4.8/5
(30)

A level 1 security system is used to protect _____ against unauthorized access.

(Multiple Choice)
4.9/5
(34)

_________,a biometric security measure,translates words into digital patterns,which are recorded and examined for tone and pitch.

(Multiple Choice)
4.9/5
(30)

Describe the process of vein analysis in biometric security measures.

(Essay)
5.0/5
(25)

Which of the following is a type of access control used to protect systems from unauthorized access?

(Multiple Choice)
4.8/5
(37)

_____ encryption is also known as secret key encryption.

(Multiple Choice)
4.9/5
(32)

In the context of security threats,_________ means using "people skills"-such as being a good listener and assuming a friendly,unthreatening air-to trick others into revealing private information.

(Multiple Choice)
4.7/5
(36)

Describe how uninterruptible power supply (UPS)is used a part of a comprehensive security system.

(Essay)
4.9/5
(32)

A _____ plan lists the tasks that must be performed to restore damaged data and equipment.

(Multiple Choice)
4.8/5
(41)

What are the functions of a computer emergency response team (CERT)?

(Essay)
4.9/5
(40)

A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.

(True/False)
4.8/5
(25)

What is an intrusion detection system (IDS)?

(Essay)
4.8/5
(35)

A _________ threat is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

(Multiple Choice)
4.9/5
(39)
Showing 81 - 100 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)