Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Security is a technology issue and not just a management issue.

(True/False)
4.9/5
(36)

A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions is called

(Multiple Choice)
4.7/5
(29)

________ is/are an example of a preventive control.

(Multiple Choice)
4.8/5
(44)

Verifying the identity of the person or device attempting to access the system is an example of

(Multiple Choice)
4.9/5
(42)

According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that

(Multiple Choice)
4.8/5
(31)

Virtualization refers to the ability of

(Multiple Choice)
4.8/5
(38)

The steps that criminals take to study their target's physical layout to learn about the controls it has in place is called

(Multiple Choice)
4.8/5
(34)

A well-known hacker started her own computer security consulting business.Many companies pay her to attempt to gain unauthorized access to their network.If she is successful,she offers advice as to how to design and implement better controls.What is the name of the testing for which the hacker is being paid?

(Multiple Choice)
4.8/5
(40)

Identify three ways users can be authenticated and give an example of each.

(Essay)
4.8/5
(34)

Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?

(Multiple Choice)
4.9/5
(48)

The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as

(Multiple Choice)
4.9/5
(33)

________ is/are an example of a preventive control.

(Multiple Choice)
4.8/5
(33)

Which of the following is not a step in an organization's incident response process?

(Multiple Choice)
4.8/5
(33)

Multi-factor authentication

(Multiple Choice)
4.9/5
(34)

This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

(Multiple Choice)
4.9/5
(37)

There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?

(Multiple Choice)
4.7/5
(44)

Information security procedures protect information integrity by

(Multiple Choice)
4.8/5
(41)

Describe what a man-trap is and how it contributes to information security.

(Essay)
4.8/5
(37)

Which of the below keeps a record of the network traffic permitted to pass through a firewall?

(Multiple Choice)
4.9/5
(40)

Which of the following is not one of the essential criteria for successfully implementing each of the principles that contribute to systems reliability,as discussed in the Trust Services Framework?

(Multiple Choice)
4.9/5
(38)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)