Exam 2: General Security Concepts
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
The hacker was successful in breaching the firewall,the packet filtering router,and the internal firewall,but was quickly detected and unable to get past the workstation personal firewall.This is an example of what principle?
(Multiple Choice)
4.7/5
(38)
All applications,scripts,and batch files run in the same security context of the user who is logged in at the time.
(True/False)
4.9/5
(36)
The ability to manage whether a subject can interact with an object is called _______________.
(Short Answer)
4.8/5
(41)
During the day,it takes an employee twice as long to retrieve files from the server that is under attack.The attack has resulted in a degradation of availability.
If the employee is able to get the files,but it takes twice as long,it means that the employee can only get half as many files in a day.
(True/False)
4.8/5
(25)
Backups,incident response teams,and computer forensics are response technologies.
(True/False)
4.8/5
(41)
Jane is in the finance department.Although she should not be able to open files or folders from the marketing department,she can and does.This a problem of ___________.
(Multiple Choice)
5.0/5
(32)
A newly purchased server with a defect catches fire and all data on the device is lost.A backup was never performed.This is a failure of which element of the operational model of computer security?
(Multiple Choice)
4.8/5
(32)
When files are modified by someone who is not authorized to do so,this is problem of confidentiality.
(True/False)
4.8/5
(40)
The network engineer suggests purchasing two firewalls from different companies so that a vulnerability affecting one type of firewall will not leave the entire network vulnerable.This is an example of which principle?
(Multiple Choice)
4.9/5
(34)
Your boss is concerned with information security issues concerning new employees and employees who leave the company and would like your recommendations.Describe what human resources policies should be in place.
(Essay)
4.8/5
(31)
During a job interview you are asked to explain in what ways you would secure the company's information if you were hired.Using any three security policies from the chapter,describe how you would secure their information.
(Essay)
4.8/5
(36)
Auditability refers to whether a control can be verified as functioning or not.
(True/False)
4.9/5
(35)
Describe the Bell-LaPadula and Biba security models and the policies they use to protect information.
(Essay)
4.7/5
(34)
_______________ is the condition that a control can be verified as functioning.
(Short Answer)
4.8/5
(37)
Three means of establishing auditability: something you know,something you have,or something you are.
(True/False)
4.8/5
(32)
Network security places the emphasis on controlling access to external resources from internal entities.
(True/False)
4.8/5
(29)
Ensuring that an individual is who they claim to be before allowing them to access information they are authorized to access is _______________.
(Short Answer)
4.8/5
(27)
Access controls,firewalls,and encryption are technologies used for prevention.
(True/False)
4.8/5
(38)
Background checks,drug testing,retirement,and termination are elements found in which type of policy?
(Multiple Choice)
4.7/5
(29)
___________ places the focus on the security processes and the actual data.
(Multiple Choice)
4.8/5
(32)
Showing 41 - 60 of 65
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)