Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
The ____ would typically NOT be a member of the security project team.
Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
D
____ refers to multiple layers of security controls and safeguards is called.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
C
Acceptance is a viable solution only if the organization has evaluated the risk and determined that the implementation of additional controls or strategies is not justified, due to cost or other organizational issues.
Free
(True/False)
4.8/5
(45)
Correct Answer:
True
____ means that information is free from mistakes or errors.
(Multiple Choice)
4.9/5
(34)
A(n) ____ attack is when a system is compromised and used to attack other systems.
(Multiple Choice)
4.9/5
(37)
An organization will often create a network security ____________________, which defines the boundary between the outer limit of an organization's security and the beginning of the outside network.
(Short Answer)
4.8/5
(32)
A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database applications is called a ____.
(Multiple Choice)
4.9/5
(40)
A(n) ____ is a category of object, person, or other entity that poses a potential risk of loss to an asset.
(Multiple Choice)
4.9/5
(27)
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the target with so much irrelevant email that legitimate email cannot be used.
(Multiple Choice)
4.7/5
(49)
Brute force attacks are often successful against systems that have adopted the usual security practices recommended by manufacturers.
(True/False)
4.7/5
(35)
Attempting to determine a password that is not known to the attacker is often called ____.
(Multiple Choice)
4.8/5
(27)
A ____ attempts to protect internal systems from outside threats.
(Multiple Choice)
4.9/5
(34)
Match each item with a statement below.
-Responsible for the storage, maintenance, and protection of the information.
(Multiple Choice)
4.8/5
(38)
The ____ is based on a model developed by the U.S.Committee on National Systems Security (CNSS).
(Multiple Choice)
4.8/5
(32)
Describe the importance of enabling the safe operation of applications.
(Essay)
4.9/5
(31)
In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.
(Multiple Choice)
4.8/5
(34)
The most common Intellectual Property breach is ____________________.
(Short Answer)
4.7/5
(35)
Match each item with a statement below.
-Information is protected from disclosure or exposure to unauthorized individuals or systems.
(Multiple Choice)
5.0/5
(35)
Match each item with a statement below.
-Information remains whole, complete, and uncorrupted.
(Multiple Choice)
4.7/5
(28)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)