Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the actions that a firewall might take after examining a packet?

(Essay)
4.8/5
(31)

How does a worm disrupt computing services?

(Essay)
4.8/5
(41)

Which of the following is true of phishing?

(Multiple Choice)
4.8/5
(25)

Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.

(True/False)
4.8/5
(33)

What is data encryption?

(Essay)
4.8/5
(36)

In nonbiometric security measure,a _____ is a software that acts as an intermediary between two systems.

(Multiple Choice)
4.7/5
(26)

If a drive in a redundant array of independent disks (RAID)system fails,data stored on it can be reconstructed from data stored on the remaining drives.

(True/False)
4.9/5
(39)

In physical security measures,using _____ is an inexpensive way to secure a computer to a counter.

(Multiple Choice)
4.9/5
(39)
Showing 101 - 108 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)