Exam 26: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

___________ is a method for confirming users' identities.

(Short Answer)
4.8/5
(34)

Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.

(Short Answer)
4.8/5
(42)

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

(Multiple Choice)
4.8/5
(33)

_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

(Short Answer)
4.8/5
(43)

What floods a website with so many requests for service that it slows down or crashes the site?

(Multiple Choice)
4.7/5
(37)

Which of the following is not one of the five steps for creating an information security plan?

(Multiple Choice)
4.8/5
(28)

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

(Short Answer)
4.8/5
(36)

The most common type of defense within detection and response technologies is _________ software.

(Short Answer)
4.8/5
(33)

What is the most secure type of authentication?

(Multiple Choice)
4.9/5
(31)

What is social engineering?

(Multiple Choice)
4.8/5
(20)

Which of the following can be completed by encryption?

(Multiple Choice)
4.7/5
(39)

___________ attack computer systems by transmitting a virus hoax,with a real virus attached.

(Short Answer)
4.9/5
(29)

What identifies the rules required to maintain information security?

(Multiple Choice)
4.8/5
(38)

___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

(Short Answer)
4.7/5
(34)

Who works at the request of the system owners to find system vulnerabilities and plug the holes?

(Multiple Choice)
4.9/5
(33)

A(n)_________ is software written with malicious intent to cause annoyance or damage.

(Short Answer)
4.8/5
(33)

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

(Short Answer)
4.7/5
(38)

A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

(Short Answer)
4.9/5
(36)

Who breaks into other people's computer systems and just looks around or steals and destroys information?

(Multiple Choice)
4.9/5
(40)

Describe the relationships and differences between hackers and viruses.

(Essay)
4.7/5
(32)
Showing 21 - 40 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)