Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Code Red,Melissa,and Sasser are examples of _____.

(Multiple Choice)
5.0/5
(25)

A _____ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.

(Multiple Choice)
4.9/5
(44)

_____ is the unauthorized use of system data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.

(Multiple Choice)
4.8/5
(35)

Which statement is true of application-filtering firewalls?

(Multiple Choice)
4.7/5
(38)

In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.

(Multiple Choice)
4.9/5
(32)

In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

(Multiple Choice)
4.8/5
(38)

A(n)_____ network is often used so that remote users have a secure connection to an organization's network.

(Multiple Choice)
4.9/5
(31)

A _____ is a type of an intentional computer and network threat.

(Multiple Choice)
4.8/5
(40)

When disaster strikes,an organization should contact the insurance company to resume normal operations as soon as possible.

(True/False)
4.8/5
(33)
Showing 101 - 109 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)