Exam 1: Computer Systems Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)_________ is any means taken to deal with a security attack.

Free
(Short Answer)
4.7/5
(37)
Correct Answer:
Verified

countermeasure

The more critical a component or service,the higher the level of availability required.

Free
(True/False)
5.0/5
(34)
Correct Answer:
Verified

True

Misappropriation and misuse are attacks that result in ________ threat consequences.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

usurpation

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

(Multiple Choice)
4.7/5
(35)

T F 4.Availability assures that systems works promptly and service is not denied to authorized users.

(True/False)
4.9/5
(35)

A(n)__________ is an action,device,procedure,or technique that reduces a threat,a vulnerability,or an attack by eliminating or preventing it,by minimizing the harm it can cause,or by discovering and reporting it so that correct action can be taken.

(Multiple Choice)
4.8/5
(26)

A(n)_________ assessment is periodically assessing the risk to organizational operations,organizational assets,and individuals,resulting from the operation of organizational information systems and the associated processing,storage,or transmission or organizational information.

(Short Answer)
4.8/5
(34)

Assurance is the process of examining a computer product or system with respect to certain criteria.

(True/False)
4.8/5
(38)

A flaw or weakness in a system's design,implementation,or operation and management that could be exploited to violate the system's security policy is a(n)__________.

(Multiple Choice)
4.9/5
(38)

The assurance that data received are exactly as sent by an authorized entity is __________.

(Multiple Choice)
4.7/5
(40)

Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them.

(True/False)
4.8/5
(35)

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n)__________.

(Multiple Choice)
4.9/5
(29)

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

(Multiple Choice)
4.8/5
(36)

Security implementation involves four complementary courses of action: prevention,detection,response,and _________.

(Short Answer)
4.8/5
(36)

Hardware is the most vulnerable to attack and the least susceptible to automated controls.

(True/False)
4.9/5
(28)

The _________ prevents or inhibits the normal use or management of communications facilities.

(Multiple Choice)
4.8/5
(36)

Masquerade,falsification,and repudiation are threat actions that cause __________ threat consequences.

(Multiple Choice)
4.8/5
(35)

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

(Multiple Choice)
4.9/5
(40)

________ assures that a system performs its intended function in an unimpaired manner,free from deliberate or inadvertent unauthorized manipulation of the system.

(Multiple Choice)
4.9/5
(44)

A(n)_________ is a threat that is carried out and,if successful,leads to an undesirable violation of security,or threat consequence.

(Short Answer)
4.8/5
(45)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)