Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Match each item with a statement below.
-Component in a system that allows the attacker to access the system at will, bypassing standard login controls.
(Multiple Choice)
4.7/5
(35)
When a computer is the ____ of an attack, it is used as an active tool to conduct the attack.
(Multiple Choice)
4.8/5
(27)
To make sound decisions about information security, management must be informed about the various threats facing the organization, its people, applications, data, and information systems.
(True/False)
4.9/5
(33)
Match each item with a statement below.
-Involves operating an information system that meets the high level of availability sought by system users as well as the confidentiality and integrity needs of system owners and security professionals
(Multiple Choice)
4.8/5
(28)
A(n) ____ is a weakness or fault in the mechanisms that are intended to protect information and information assets from attack or damage.
(Multiple Choice)
4.9/5
(29)
The ____________________ is primarily responsible for advising the chief executive officer, president, or company owner on the strategic planning that affects the management of information in the organization.
(Short Answer)
4.9/5
(34)
A data ____ might be a specifically identified role or part of the duties of a systems administrator.
(Multiple Choice)
4.9/5
(36)
____ attacks may involve individuals posing as new employees or as current employees desperately requesting assistance to avoid getting fired.
(Multiple Choice)
4.9/5
(38)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)