Exam 2: The Need for Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
A
_________ is the percentage of time a particular service is available.
Free
(Short Answer)
4.8/5
(43)
Correct Answer:
uptime
up-time
up time
Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
The average amount of time until the next hardware failure is known as __________.
(Multiple Choice)
4.9/5
(41)
When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment. _________________________
(True/False)
4.9/5
(36)
Media are items of fact collected by an organization and include raw numbers, facts, and words.
(True/False)
4.8/5
(38)
A short-term interruption in electrical power availability is known as a ____.
(Multiple Choice)
4.7/5
(37)
The macro virus infects the key operating system files located in a computer's start-up sector. _________________________
(True/False)
4.8/5
(46)
__________ occurs when an application running on a Web server inserts commands into a user's browser session and causes information to be sent to a hostile server.
(Short Answer)
4.7/5
(31)
Hackers can be generalized into two skill groups: expert and ____________________.
(Multiple Choice)
4.9/5
(32)
Script ____________________ are hackers of limited skill who use expertly written software to attack a system.
(Short Answer)
4.7/5
(41)
Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).
(True/False)
4.8/5
(32)
The ____________________ fraud is a social engineering attack that involves convincing the victim to participate in a seeming money-making venture while getting the victim to pay fees or bribes or to refund uncleared international payments.
(Short Answer)
4.9/5
(40)
Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________
(True/False)
4.8/5
(35)
A computer virus consists of segments of code that perform ____________________ actions.
(Short Answer)
4.8/5
(31)
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
(Multiple Choice)
4.8/5
(43)
Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas." _________________________
(True/False)
4.7/5
(33)
A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
(Multiple Choice)
4.7/5
(33)
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) longer than ____________________ characters in Internet Explorer 4.0, the browser will crash.
(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)