Exam 10: Protection Mechanisms
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
Digital key infrastructure is the entire set of hardware,software,and cryptosystems necessary to implement asymmetric key encryption in online commerce.
Free
(True/False)
4.8/5
(43)
Correct Answer:
False
____________________ is the confirmation of the identity of the entity accessing a logical or physical area.
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Authentication
A(n)____________________ is a private word or combination of characters known only by the user.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
password
____________________ is the organized research of Internet addresses owned or controlled by a target organization,identified from public Internet data sources..
(Short Answer)
5.0/5
(28)
Fourth generation firewalls,known as ____,allow only specific packets with a particular source,destination,and port address to pass through it.
(Multiple Choice)
4.7/5
(34)
____ are scanning and analysis tools that are capable of scanning networks for very detailed information.
(Multiple Choice)
4.8/5
(34)
A dumb card is a category that includes ID and ATM cards with magnetic strips containing the digital PIN against which a user's input is compared.
(True/False)
4.8/5
(35)
Port number ____ is commonly used for the Simple Mail Transfer Protocol service.
(Multiple Choice)
4.8/5
(40)
____ controls defend against threats from within the organization.
(Multiple Choice)
4.8/5
(32)
____________________ or genetic authentication is not yet a cost-effective and socially accepted technology that can be included in the "something you are" category.
(Short Answer)
4.8/5
(33)
Which of the following characteristics currently used today for authentication purposes is NOT considered truly unique?
(Multiple Choice)
4.8/5
(39)
A ____ commonly combines a separate dedicated firewall such as an application proxy server with a packet filtering router.
(Multiple Choice)
4.9/5
(35)
Trap and Trace applications collect and analyze copies of packets from the network.
(True/False)
4.8/5
(30)
A firewall uses its ____ to decide whether or not to allow packets into the network.
(Multiple Choice)
4.8/5
(33)
____ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP/IP family of protocol standards,including use for VPNs.
(Multiple Choice)
4.8/5
(32)
The transformation of individual components such as characters or bits of an unencrypted message into encrypted components is known as ____.
(Multiple Choice)
4.8/5
(33)
The "something you have" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.
(True/False)
4.8/5
(27)
The trace function in a trap and trace scanning tool entices individuals who are illegally perusing the internal sections of a network,in order to determine who they are._________________________
(True/False)
5.0/5
(29)
Technical controls alone are adequately equipped to ensure a secure IT environment.
(True/False)
4.8/5
(36)
Showing 1 - 20 of 133
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)