Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.

(Multiple Choice)
4.8/5
(30)

Which is a nonbiometric security measure?

(Multiple Choice)
4.8/5
(35)

Which of the following statements is true of a worm?

(Multiple Choice)
4.8/5
(24)

Explain the use of callback modems as a nonbiometric security measure.

(Essay)
4.9/5
(36)

In the context of intentional computer and network threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

(Multiple Choice)
4.8/5
(34)

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

(True/False)
4.9/5
(38)

_____,a recent cryptographic protocol,ensures data security and integrity over public networks,such as the Internet.

(Multiple Choice)
4.8/5
(41)

Briefly explain how packet-filtering firewalls work.

(Essay)
4.8/5
(40)

In the context of computer and network security,a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.

(Multiple Choice)
4.7/5
(37)

In some instances,after examining an incoming packet,a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.

(True/False)
4.9/5
(31)

The process of capturing and recording network traffic is referred to as _____.

(Multiple Choice)
4.8/5
(29)

_____ are usually placed in front of a firewall and can identify attack signatures,trace patterns,generate alarms for a network administrator,and cause routers to terminate connections with suspicious sources.

(Multiple Choice)
4.7/5
(35)

_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.

(Multiple Choice)
4.9/5
(30)

_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.

(Multiple Choice)
4.7/5
(30)

_____ is an example of antispyware software.

(Multiple Choice)
4.8/5
(33)

In data encryption,the https in a browser address bar indicates a safe HTTP connection over _____.

(Multiple Choice)
4.7/5
(36)

In the context of intentional computer and network threats,social engineers protects the integrity of information resources.

(True/False)
4.8/5
(29)

A _____ consists of self-propagating program code that is triggered by a specified time or event.

(Multiple Choice)
4.7/5
(28)

Which statement is true of phishing?

(Multiple Choice)
4.8/5
(40)

Briefly list some of the indications of a computer being infected by a virus.

(Essay)
4.8/5
(37)
Showing 81 - 100 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)