Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which statement is true of symmetric encryption?

(Multiple Choice)
4.9/5
(37)

Which form of text needs to be unscrambled using a decryption key?

(Multiple Choice)
4.8/5
(42)

When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.

(True/False)
4.8/5
(30)

When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.

(True/False)
4.9/5
(40)

The cost of setting up a virtual private network (VPN)is usually high.

(True/False)
4.8/5
(27)

In a level 2 security system,_____ must be protected to ensure confidentiality,accuracy,and integrity of data.

(Multiple Choice)
4.8/5
(39)

Social engineering is an attack that takes advantage of the backdoors in security systems.

(True/False)
4.7/5
(37)

If a drive in a redundant array of independent disks (RAID)system fails,data stored on it can be reconstructed from data stored on the remaining drives.

(True/False)
4.8/5
(34)

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

(Multiple Choice)
4.9/5
(37)

In the context of computer crimes and attacks,the difference between phishing and spear phishing is that:

(Multiple Choice)
4.8/5
(31)

The main drawback of an intrusion detection system (IDS)is its inability to prevent denial-of-service (DoS)attacks.

(True/False)
4.7/5
(38)

Data sent through a virtual private network (VPN)can be encrypted using the _____.

(Multiple Choice)
4.8/5
(40)

In the context of data encryption,briefly describe asymmetric encryption.

(Essay)
4.9/5
(42)

In the context of computer and network security,_____ means a quick recovery in the event of a system failure or disaster.

(Multiple Choice)
4.9/5
(32)

A(n)_____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

(Multiple Choice)
4.8/5
(33)

In contrast to pharming,phishing involves hijacking an official Web site address by hacking a Domain Name System server.

(True/False)
4.8/5
(35)

Explain how proximity-release door openers are used as a physical security measure to control access to computers and networks.

(Essay)
4.8/5
(32)

When a computer is infected by a virus,_____.

(Multiple Choice)
4.7/5
(34)

A level 1 security system is used to protect _____ against unauthorized access.

(Multiple Choice)
4.7/5
(30)

Which statement is true of firewalls?

(Multiple Choice)
4.9/5
(28)
Showing 61 - 80 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)