Exam 26: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the most costly and intrusive form of authentication?

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

C

Tokens are small electronic devices that change user passwords __________.

Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Verified

automatically

A(n)_______ is a program or device that can monitor data traveling over a network.

Free
(Short Answer)
4.8/5
(45)
Correct Answer:
Verified

sniffer

_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.

(Short Answer)
5.0/5
(35)

What includes a variety of threats such as viruses,worms,and Trojan horses?

(Multiple Choice)
4.9/5
(27)

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

(Short Answer)
4.9/5
(39)

What is encryption?

(Multiple Choice)
5.0/5
(32)

A(n)information security ____________ details how an organization will implement the information security policies.

(Short Answer)
4.8/5
(35)

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

(Multiple Choice)
4.7/5
(36)

Tokens are small electronic devices that change user passwords automatically.

(True/False)
5.0/5
(28)

Which of the following authentication methods is 100 percent accurate?

(Multiple Choice)
4.8/5
(37)

Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.

(Short Answer)
4.8/5
(45)

The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.

(Short Answer)
4.9/5
(38)

Develop the information security policies is the ________________ step for creating an information security plan.

(Short Answer)
4.8/5
(36)

_________ programs are viruses that open a way into the network for future attacks.

(Short Answer)
4.8/5
(42)

What is a method for confirming users' identities?

(Multiple Choice)
4.9/5
(31)

A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.

(Short Answer)
4.9/5
(32)

Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.

(Short Answer)
4.9/5
(32)

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

(Multiple Choice)
4.8/5
(41)

Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.

(Short Answer)
4.9/5
(40)
Showing 1 - 20 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)