Exam 26: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not considered a type of biometrics?

(Multiple Choice)
4.8/5
(39)

Content filtering,_________,and firewalls are the three types of prevention and resistance technologies.

(Short Answer)
4.8/5
(29)

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

(Multiple Choice)
4.7/5
(32)

Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?

(Multiple Choice)
4.8/5
(38)

Who are hackers with criminal intent?

(Multiple Choice)
4.8/5
(44)

Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.

(Short Answer)
4.8/5
(32)

Social engineering is using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.

(Short Answer)
4.7/5
(35)

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

(Short Answer)
4.9/5
(30)

What are the technologies available to help prevent and build resistance to attacks?

(Multiple Choice)
4.8/5
(29)

What is the most common type of defense within detection and response technologies?

(Multiple Choice)
5.0/5
(39)

Which is a virus that opens a way into the network for future attacks?

(Multiple Choice)
4.9/5
(42)

Which of the following is not one of the three primary information security areas?

(Multiple Choice)
4.9/5
(34)

What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?

(Multiple Choice)
4.7/5
(35)

Which of the following is a program or device that can monitor data traveling over a network?

(Multiple Choice)
4.8/5
(32)

Where do organizations typically place firewalls?

(Multiple Choice)
4.9/5
(39)

Information security ______________ identify the rules required to maintain information security.

(Short Answer)
4.8/5
(41)
Showing 61 - 76 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)