Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the system not allow access (or availability) to anyone.
(True/False)
4.8/5
(39)
In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Protocol spoofing techniques, and then inserts them back into the network.
(Short Answer)
4.8/5
(41)
____ is a technique used to gain unauthorized access to computers, wherein the attacker assumes or simulates an address that indicate to the victim that the messages are coming from the address of a trusted host.
(Multiple Choice)
4.8/5
(45)
Match each item with a statement below.
-Malicious program that replicates itself constantly.
(Multiple Choice)
4.7/5
(38)
What important organizational functions are performed by Information Security?
(Essay)
4.8/5
(41)
The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.
(Multiple Choice)
4.8/5
(34)
A majority of organizations use information systems primarily to support their strategic planning.
(True/False)
4.9/5
(29)
Match each item with a statement below.
-Software programs that reveals its designed behavior only when activated.
(Multiple Choice)
4.7/5
(38)
An individual who hacks the public telephone network to make free calls or disrupt services is called a ____.
(Multiple Choice)
4.9/5
(34)
Match each item with a statement below.
-Information is free from mistakes or errors.
(Multiple Choice)
4.8/5
(27)
-According the to CSI/FBI Computer Crime and Security Survey, the most dominant type of attack for the last decade was ____.
(Multiple Choice)
4.8/5
(28)
Match each item with a statement below.
-Responsible for the security and use of a particular set of information.
(Multiple Choice)
4.9/5
(41)
A(n) ____________________ is an application error that occurs when more data is sent to a buffer than it can handle.
(Short Answer)
4.9/5
(37)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)