Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The three important aspects of computer and network security,confidentiality,integrity,and availability,are collectively referred to as the CIA triangle.

(True/False)
4.9/5
(48)

In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.

(Multiple Choice)
4.8/5
(38)

In the context of the common intentional security threats,which statement best describes a worm?

(Multiple Choice)
4.9/5
(36)

Level 1 security protects back-end systems to ensure confidentiality,accuracy,and integrity of data.

(True/False)
4.9/5
(34)

In the event of a network attack or intrusion,a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

(Multiple Choice)
4.8/5
(36)

_____,a biometric security measure,translates words into digital patterns,which are recorded and examined for tone and pitch.

(Multiple Choice)
4.9/5
(37)

_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.

(Multiple Choice)
4.8/5
(34)

Which security measure uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others?

(Multiple Choice)
4.9/5
(26)

In the context of firewall as a nonbiometric security measure,a _____ is software that acts as an intermediary between two systems.

(Multiple Choice)
4.8/5
(36)

Describe how a virtual private network (VPN)works.

(Essay)
4.8/5
(33)

List the actions that a firewall can take after examining a packet.

(Essay)
4.9/5
(42)

Which biometric security measure compares the length of each finger,the translucence of fingertips,and the webbing between fingers against stored data to verify users' identities?

(Multiple Choice)
4.8/5
(34)

Briefly discuss how a worm can disrupt a computer or a network.

(Essay)
4.8/5
(37)

In the context of fault-tolerant systems,describe uninterruptible power supply (UPS).

(Essay)
4.8/5
(34)

In the context of intentional computer and network threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

(Multiple Choice)
4.9/5
(36)

_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.

(Multiple Choice)
4.7/5
(32)

When an organization develops a comprehensive security plan,it should set up a security committee with representatives from all departments as well as upper management.

(True/False)
4.8/5
(33)

_____ is also known as secret key encryption.

(Multiple Choice)
4.8/5
(25)

_____ is one of the most popular password managers.

(Multiple Choice)
4.9/5
(40)

Discuss the functions of the Computer Emergency Response Team (CERT).

(Essay)
4.8/5
(28)
Showing 41 - 60 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)