Exam 2: General Security Concepts
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Jane is in the finance department.Although she should not be able to modify files or folders from the marketing department,she can,and does.This a problem of ___________.
(Multiple Choice)
4.9/5
(40)
Which of the following is a security model that addresses integrity?
(Multiple Choice)
4.8/5
(25)
The database administrator falls ill and is not able to come to work for three weeks.No one else in the company knows how to administer the database server.This is a result of not following which principle?
(Multiple Choice)
4.9/5
(34)
_______________ security places the emphasis on controlling access to internal computers from external entities.
(Short Answer)
4.8/5
(36)
Nonrepudiation means that the person who sends an e-mail will be unable to deny sending the e-mail.
(True/False)
4.8/5
(21)
Rumors spread around the office that Mrs.Smith was stealing office supplies as well as talking badly about the senior management.This rumor eventually reached her boss,who then fired her.This is likely a violation of which policy?
(Multiple Choice)
4.7/5
(26)
_______________ ensures that the data,or the system itself,is available for use when the authorized user wants it.
(Short Answer)
4.9/5
(30)
John,who is in the development group,has admin passwords to both the development group files and the production group files.This might be a violation of which policy?
(Multiple Choice)
4.9/5
(34)
To ensure that only those individuals who have authority to view a piece of information may do so is called _______________.
(Short Answer)
4.9/5
(41)
The term which refers to the attempt to gain unauthorized access to systems and computers used by a telephone company to operate its telephone network is a _______.
(Multiple Choice)
4.8/5
(31)
Reducing the number of services to the least number necessary for it to properly perform its functions is an example of which principle?
(Multiple Choice)
4.9/5
(36)
The formula for the operational model of computer security is Prevention = Protection + (Detection + Response)
(True/False)
4.8/5
(34)
Joe sends a scathing e-mail to his boss regarding increased work hours.Joe tries to deny sending the e-mail,but is unable to due to the use of digital signatures.This is an example of ________.
(Multiple Choice)
4.8/5
(37)
Bob inadvertently disconnects the cable from the company file server.This creates a problem of ________.
(Multiple Choice)
4.9/5
(31)
Making the effort to compromise a system more costly than the value of accomplishing it is the goal of security.
(True/False)
4.8/5
(28)
Gathering seemingly unimportant information and then combining it to discover potentially sensitive information is known as _______________.
(Short Answer)
4.8/5
(26)
Which of the following is a security model that uses transactions as the basis for its rules?
(Multiple Choice)
4.9/5
(35)
Audit logs,intrusion detection systems,and honeypots are technologies used for detection.
(True/False)
4.8/5
(42)
Showing 21 - 40 of 65
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)