Exam 2: General Security Concepts
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Computer security and information assurance are the same thing.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
A person who tries to gradually obtain information necessary to compromise a network-by first appealing for help,and then,if necessary,by a more aggressive approach-is a(n)__________.
Free
(Multiple Choice)
5.0/5
(40)
Correct Answer:
B
Jane spends quite a bit of time on Facebook,and other social networking sites during work hours.This has resulted in reduced productivity.This is likely a violation of which policy?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
In the context of information security,what does the acronym CIA stand for? Explain each term.
(Essay)
4.9/5
(37)
A list of web sites that can be visited is created.Only sites that are on the list are allowed to be accessed.This is an example of which principle?
(Multiple Choice)
4.7/5
(43)
Which of the following is not one of the three general methods used in authentication?
(Multiple Choice)
4.8/5
(34)
Requiring one employee to place an order and another employee to authorize the sale is an example of which principle?
(Multiple Choice)
4.8/5
(29)
A database server is put on the network by the for a project manager.No one is told it is there except for the project manager,so that he can work on it without worrying that other individuals will try to get to it.This is an example of which principle?
(Multiple Choice)
4.9/5
(31)
Bob works in a small office with a network of computers.Bob,along with all the other employees,is responsible for securing his own computer on the network.This is an example of network security.
(True/False)
4.7/5
(45)
Ensuring that users have access only to the files they need to complete their tasks is an example of which principle?
(Multiple Choice)
4.8/5
(28)
_______________ deals with the ability to verify that a message has been sent and received and that the sender can be identified and verified.
(Short Answer)
4.9/5
(30)
The IDS fails to alert on an intruder's ping sweep and port scan.This is a failure of which element of the operational model of computer security?
(Multiple Choice)
4.9/5
(37)
_______________ security takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole.
(Short Answer)
4.7/5
(24)
A company doing business online conducted all financial transactions over the Internet without any encryption.As a result,customer information such as credit card numbers,expiration dates,and the security codes found on the back of the credit cards was stolen.This is a violation of which policy?
(Multiple Choice)
4.9/5
(41)
Authentication means that the person who sends and e-mail will be unable to deny sending the e-mail.
(True/False)
4.8/5
(24)
Operating systems and applications all implement rights and permissions the same way.
(True/False)
4.9/5
(31)
Ensuring that changes made to the data are only done by users who are authorized to do so protects the data's _______________.
(Short Answer)
4.8/5
(42)
Ensuring that and individual is who they claim to be is the function of _________.
(Multiple Choice)
5.0/5
(41)
Showing 1 - 20 of 65
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)