Exam 9: Hardware and Software Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An IDS that compares observed activity with defined patterns is a

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

C

Assessing the safety of a file using scores calculated from its observable attributes is called

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

The merits of firewalls include all the following except

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

D

PINs are useful in high security systems

(True/False)
4.9/5
(36)

Password guessing is

(Multiple Choice)
4.7/5
(44)

An IDS that looks for specific sequences of bytes is a

(Multiple Choice)
4.9/5
(38)

End-point protection defends against attacks on

(Multiple Choice)
4.7/5
(26)

A firewall is

(Multiple Choice)
4.7/5
(37)

An IDS that compares observed events against defined activities for each protocol is a

(Multiple Choice)
4.9/5
(38)

Password cracking is

(Multiple Choice)
4.7/5
(45)

Considerations while prioritizing patches include all of the following except the

(Multiple Choice)
4.7/5
(36)

Password capturing is

(Multiple Choice)
4.8/5
(29)

Examining byte sequences in incoming and outgoing data is called

(Multiple Choice)
4.9/5
(30)

The de-militarized zone in the context of information security refers to

(Multiple Choice)
4.9/5
(34)

Patches should always be installed as soon as they become available

(True/False)
4.8/5
(34)

Methods used by endpoint security software for recognizing malware include

(Multiple Choice)
4.8/5
(33)

Threats to passwords include

(Multiple Choice)
4.8/5
(37)

A PIN is

(Multiple Choice)
4.9/5
(32)

Compromised passwords is/ are

(Multiple Choice)
4.8/5
(31)

Password management is

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)