Exam 1: Introduction and Security Trends
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
The Code Red Worm spread to 350,000 computers in just over a week.
It took just 14 hours.
Free
(True/False)
4.8/5
(41)
Correct Answer:
False
There are three general reasons a particular computer system is attacked: It is specifically targeted by the attacker,it is a target of opportunity,or it is a target that was specified to be attacked by a larger criminal organization.
Free
(True/False)
4.9/5
(30)
Correct Answer:
False
What is the most common threat to information security in an organization?
(Multiple Choice)
5.0/5
(30)
Hackers who are able to discover new vulnerabilities and write code to exploit them are known as _______________.
(Short Answer)
4.8/5
(31)
According to the Computer Crime and Security Survey,the four types of attacks that increased from 2007 to 2008 were
(Multiple Choice)
4.9/5
(36)
The second step an administrator can take in minimizing possible avenues of attack is _______________.
(Short Answer)
4.9/5
(35)
Fifty years ago,few people had access to a computer system or network,so securing them was a relatively easy matter.
(True/False)
4.9/5
(35)
Choose 3 security incidents from the last 20 or so years and state the significance of the incident.
(Essay)
4.9/5
(29)
_______________ are people who attack networks with a political purpose in mind.
(Short Answer)
4.7/5
(27)
There are a number of different threats to security,including viruses and worms,intruders,insiders,criminal organizations,terrorists,and information warfare conducted by foreign countries.
(True/False)
4.9/5
(36)
As the level of sophistication of attacks _________,the level of knowledge necessary to exploit vulnerabilities decreased.
(Short Answer)
4.9/5
(32)
The first step an administrator can take to reduce possible attacks is to
(Multiple Choice)
4.8/5
(32)
The first worm to attack the Internet was the _______________.
(Short Answer)
4.9/5
(34)
When users are unable to access information or the systems processing information,you may have suffered a
(Multiple Choice)
4.9/5
(34)
What are the three different types of hackers and what are their technical abilities?
(Essay)
4.8/5
(33)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)