Exam 2: General Security Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The hacker was successful in breaching the firewall,the packet filtering router,and the internal firewall,but was quickly detected and unable to get past the workstation personal firewall.This is an example of what principle?

(Multiple Choice)
4.7/5
(38)

All applications,scripts,and batch files run in the same security context of the user who is logged in at the time.

(True/False)
4.9/5
(36)

The ability to manage whether a subject can interact with an object is called _______________.

(Short Answer)
4.8/5
(41)

During the day,it takes an employee twice as long to retrieve files from the server that is under attack.The attack has resulted in a degradation of availability. If the employee is able to get the files,but it takes twice as long,it means that the employee can only get half as many files in a day.

(True/False)
4.8/5
(25)

Backups,incident response teams,and computer forensics are response technologies.

(True/False)
4.8/5
(41)

Jane is in the finance department.Although she should not be able to open files or folders from the marketing department,she can and does.This a problem of ___________.

(Multiple Choice)
5.0/5
(32)

A newly purchased server with a defect catches fire and all data on the device is lost.A backup was never performed.This is a failure of which element of the operational model of computer security?

(Multiple Choice)
4.8/5
(32)

When files are modified by someone who is not authorized to do so,this is problem of confidentiality.

(True/False)
4.8/5
(40)

The network engineer suggests purchasing two firewalls from different companies so that a vulnerability affecting one type of firewall will not leave the entire network vulnerable.This is an example of which principle?

(Multiple Choice)
4.9/5
(34)

Your boss is concerned with information security issues concerning new employees and employees who leave the company and would like your recommendations.Describe what human resources policies should be in place.

(Essay)
4.8/5
(31)

During a job interview you are asked to explain in what ways you would secure the company's information if you were hired.Using any three security policies from the chapter,describe how you would secure their information.

(Essay)
4.8/5
(36)

Auditability refers to whether a control can be verified as functioning or not.

(True/False)
4.9/5
(35)

Describe the Bell-LaPadula and Biba security models and the policies they use to protect information.

(Essay)
4.7/5
(34)

_______________ is the condition that a control can be verified as functioning.

(Short Answer)
4.8/5
(37)

Three means of establishing auditability: something you know,something you have,or something you are.

(True/False)
4.8/5
(32)

Network security places the emphasis on controlling access to external resources from internal entities.

(True/False)
4.8/5
(29)

Ensuring that an individual is who they claim to be before allowing them to access information they are authorized to access is _______________.

(Short Answer)
4.8/5
(27)

Access controls,firewalls,and encryption are technologies used for prevention.

(True/False)
4.8/5
(38)

Background checks,drug testing,retirement,and termination are elements found in which type of policy?

(Multiple Choice)
4.7/5
(29)

___________ places the focus on the security processes and the actual data.

(Multiple Choice)
4.8/5
(32)
Showing 41 - 60 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)