Exam 2: General Security Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computer security and information assurance are the same thing.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

A person who tries to gradually obtain information necessary to compromise a network-by first appealing for help,and then,if necessary,by a more aggressive approach-is a(n)__________.

Free
(Multiple Choice)
5.0/5
(40)
Correct Answer:
Verified

B

Jane spends quite a bit of time on Facebook,and other social networking sites during work hours.This has resulted in reduced productivity.This is likely a violation of which policy?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

In the context of information security,what does the acronym CIA stand for? Explain each term.

(Essay)
4.9/5
(37)

A list of web sites that can be visited is created.Only sites that are on the list are allowed to be accessed.This is an example of which principle?

(Multiple Choice)
4.7/5
(43)

Which of the following is not one of the three general methods used in authentication?

(Multiple Choice)
4.8/5
(34)

Requiring one employee to place an order and another employee to authorize the sale is an example of which principle?

(Multiple Choice)
4.8/5
(29)

A database server is put on the network by the for a project manager.No one is told it is there except for the project manager,so that he can work on it without worrying that other individuals will try to get to it.This is an example of which principle?

(Multiple Choice)
4.9/5
(31)

Bob works in a small office with a network of computers.Bob,along with all the other employees,is responsible for securing his own computer on the network.This is an example of network security.

(True/False)
4.7/5
(45)

Ensuring that users have access only to the files they need to complete their tasks is an example of which principle?

(Multiple Choice)
4.8/5
(28)

_______________ deals with the ability to verify that a message has been sent and received and that the sender can be identified and verified.

(Short Answer)
4.9/5
(30)

The objective of the Bell-LaPadula security model is integrity.

(True/False)
4.9/5
(36)

The operational model of security is _____________.

(Multiple Choice)
4.9/5
(28)

The IDS fails to alert on an intruder's ping sweep and port scan.This is a failure of which element of the operational model of computer security?

(Multiple Choice)
4.9/5
(37)

_______________ security takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole.

(Short Answer)
4.7/5
(24)

A company doing business online conducted all financial transactions over the Internet without any encryption.As a result,customer information such as credit card numbers,expiration dates,and the security codes found on the back of the credit cards was stolen.This is a violation of which policy?

(Multiple Choice)
4.9/5
(41)

Authentication means that the person who sends and e-mail will be unable to deny sending the e-mail.

(True/False)
4.8/5
(24)

Operating systems and applications all implement rights and permissions the same way.

(True/False)
4.9/5
(31)

Ensuring that changes made to the data are only done by users who are authorized to do so protects the data's _______________.

(Short Answer)
4.8/5
(42)

Ensuring that and individual is who they claim to be is the function of _________.

(Multiple Choice)
5.0/5
(41)
Showing 1 - 20 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)