Exam 1: Introduction and Security Trends
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
When information is modified by individuals not authorized to change it you have suffered a
(Multiple Choice)
4.7/5
(36)
What is the most common name for the first large-scale attack on the Internet that occurred in November of 1988?
(Multiple Choice)
4.8/5
(38)
_______________ are hackers who do not have enough technical skill to discovery vulnerabilities on their own,and cannot write their own scripts to exploit vulnerabilities.
(Short Answer)
4.7/5
(36)
The two general reasons a particular computer system is attacked: either it is specifically targeted by the attacker,or it is a(n)_______________.
(Short Answer)
4.8/5
(29)
One significant trend observed over the last several years has been the decrease in the number of computer attacks by nonaffiliated intruders as opposed to attacks by organized hacking groups,criminal organizations,or nations.
(True/False)
4.9/5
(41)
The biggest change that has occurred in security over the last 30 years has been the change in the computing environment from small,tightly contained mainframes to a highly widespread network of much larger systems.
(True/False)
4.7/5
(38)
A successful attack on a network may adversely impact security in all the following ways EXCEPT:
(Multiple Choice)
4.8/5
(30)
Each of the infected systems became part of what is known as a bot network,which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users,as a result of the
(Multiple Choice)
4.8/5
(31)
What are the three types of losses that can result from an attack on information?
(Short Answer)
4.7/5
(41)
In April 2009,Homeland Security Secretary Janet Napolitano told reporters
(Multiple Choice)
4.7/5
(35)
In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.
(Short Answer)
4.8/5
(30)
Vladimir Levin was able to steal $10 Million from _______________ by using its cash management system.
(Short Answer)
4.8/5
(40)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)