Exam 5: Protecting Information Resources
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.
A
Viruses can be transmitted through a network or through e-mail attachments.
True
Briefly explain an intrusion detection system (IDS).
Answers will vary.Firewalls protect against external access,but they leave networks unprotected from internal intrusions.An IDS can protect against both external and internal access.It is usually placed in front of a firewall and can identify attack signatures,trace patterns,generate alarms for a network administrator,and cause routers to terminate connections with suspicious sources.
These systems can also prevent denial-of-service attacks.An IDS monitors network traffic and uses the "prevent,detect,and react" approach to security.Although it improves security,it requires a great deal of processing power and can affect network performance.It might also need additional configuration to prevent it from generating false positive alarms.
John downloaded Alten Cleaner,a program that poses as a computer registry cleaner,on his computer.Once he installed the program on his computer,the program illegitimately gained access to John's passwords and credit card information.In this scenario,it is evident that John was a victim of _____.
Briefly discuss dumpster diving and shoulder surfing,two commonly used social-engineering techniques.
When planning a comprehensive security system,the first step is designing _____,which use a combination of hardware and software for improving reliability,a way of ensuring availability in case of a system failure.
In the context of e-commerce transaction security measures,authentication is a critical factor because it ensures that:
An intrusion detection system (IDS)can protect networks against both external and internal access.
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
List several different types of intentional computer and network security threats.
A(n)_____contains code intended to disrupt a computer,network,or Web site and is usually hidden inside a popular program.
The main function of Cyber Incident Response Capability (CIRC)is to _____.
In the context of intentional computer and network threats,a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Which type of access control is used to protect systems from unauthorized access?
Which of the following intentional computer and network threats is a type of Trojan program used to release a virus,worm,or other destructive code?
In the context of the CIA triangle,confidentiality means that computers and networks are operating and authorized users can access the information they need.
In the context of security,_____ is an attack that takes advantage of the human element of security systems.
The Committee on National Security Systems (CNSS)proposed a model known as the _____ for evaluating information security.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)