Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as

(Multiple Choice)
4.8/5
(44)

The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as

(Multiple Choice)
4.8/5
(41)

Information security procedures protect information integrity by

(Multiple Choice)
4.8/5
(38)

The most effective method for protecting an organization from social engineering attacks is providing

(Multiple Choice)
4.7/5
(36)

If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is

(Multiple Choice)
4.9/5
(40)

On April 1,2012,students enrolled in an economics course at Harvard University received an e-mail stating that class would be cancelled.The e-mail claimed to be from the professor,but it wasn't.Computer forensic experts determined that the e-mail was sent from a computer in one of the campus labs at 6:32 A.M.They were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras revealed the identity of the student responsible for spoofing the class.

(Multiple Choice)
4.9/5
(36)

Describe the function of a computer incident response team (CIRT)and the steps that a CIRT should perform following a security incident.

(Essay)
4.8/5
(41)

Explain the value of penetration testing.

(Essay)
4.8/5
(42)

Describe what a man-trap is and how it contributes to information security.

(Essay)
4.7/5
(40)

When new employees are hired by Pacific Technologies,they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(n)

(Multiple Choice)
4.9/5
(31)

Explain social engineering.

(Essay)
4.8/5
(33)

In 2007,a major U.S.financial institution hired a security firm to attempt to compromise its computer network.A week later,the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found.This is an example of a

(Multiple Choice)
4.8/5
(37)

The most common input-related vulnerability is

(Multiple Choice)
4.8/5
(43)

Identify one aspect of systems reliability that is not a source of concern with regards to a public cloud.

(Multiple Choice)
4.9/5
(32)

This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.

(Multiple Choice)
4.9/5
(39)

Identify three ways users can be authenticated and give an example of each.

(Essay)
4.9/5
(32)

Identify the statement below which is not a useful control procedure regarding access to system outputs.

(Multiple Choice)
4.9/5
(31)

According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that

(Multiple Choice)
4.8/5
(37)

Which of the following is an example of a corrective control?

(Multiple Choice)
4.8/5
(46)

Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?

(Multiple Choice)
4.8/5
(44)
Showing 21 - 40 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)