Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

As a physical security measure,_____.

(Multiple Choice)
4.9/5
(28)

Spoofing happens when:

(Multiple Choice)
5.0/5
(26)

Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

(True/False)
4.8/5
(32)

In the context of intentional computer and network threats,describe how blended threats work.

(Essay)
4.9/5
(30)

Application-filtering firewalls are less expensive than packet-filtering firewalls.

(True/False)
4.8/5
(39)

Which of the following is a biometric security measure?

(Multiple Choice)
5.0/5
(39)

Discuss the guidelines for improving a firewall's capabilities.

(Essay)
4.9/5
(30)

In the context of biometric security measures,briefly describe some biometric devices and measures.

(Essay)
4.9/5
(29)

_____ is used to encrypt the data sent through a virtual private network (VPN).

(Multiple Choice)
4.9/5
(33)

In the context of intentional security threats,_____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

(Multiple Choice)
4.9/5
(25)

Describe the three levels of security in a comprehensive security system.

(Essay)
4.8/5
(34)

A level 3 security system focuses on protecting the _____ against intrusion,denial-of-service attacks,and unauthorized access.

(Multiple Choice)
4.8/5
(38)

_____ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

(Multiple Choice)
4.8/5
(25)

_____ is a computer crime that involves destroying or disrupting computer services.

(Multiple Choice)
4.8/5
(42)

_____ uses a public key known to everyone and a private key known only to the recipient.

(Multiple Choice)
4.7/5
(36)

_____ is a form of spyware that collects information about a user (without the user's consent)to determine which commercials to display in the user's Web browser.

(Multiple Choice)
4.8/5
(37)

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

(Multiple Choice)
4.8/5
(41)

Which statement is true of asymmetric encryption?

(Multiple Choice)
4.7/5
(36)

Which statement best describes spyware?

(Multiple Choice)
4.8/5
(42)

In the context of access controls,briefly explain the guidelines that need to be followed to increase the effectiveness of passwords.

(Essay)
4.8/5
(41)
Showing 21 - 40 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)