Exam 1: Computer Systems Overview
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Replay,masquerade,modification of messages,and denial of service are example of _________ attacks.
Free
(Essay)
4.9/5
(50)
Correct Answer:
active
Computer security is protection of the integrity,availability,and
confidentiality of information system resources.
Free
(True/False)
4.9/5
(37)
Correct Answer:
True
A __________ is data appended to,or a cryptographic transformation of,a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
Free
(Essay)
4.7/5
(29)
Correct Answer:
digital signature
X.800 architecture was developed as an international standard and
focuses on security in the context of networks and communications.
(True/False)
4.8/5
(28)
Security mechanisms typically do not involve more than one particular
algorithm or protocol.
(True/False)
4.8/5
(36)
Assurance is the process of examining a computer product or system
with respect to certain criteria.
(True/False)
4.8/5
(27)
__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
(Multiple Choice)
4.8/5
(32)
The _________ prevents or inhibits the normal use or management of communications facilities.
(Multiple Choice)
4.9/5
(36)
The more critical a component or service,the higher the level of
availability required.
(True/False)
4.9/5
(38)
A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations,organizational assets,or individuals.
(Multiple Choice)
4.9/5
(32)
__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
(Multiple Choice)
4.7/5
(38)
A(n)__________ is an action,device,procedure,or technique that reduces a threat,a vulnerability,or an attack by eliminating or preventing it,by minimizing the harm it can cause,or by discovering and reporting it so that correct action can be taken.
(Multiple Choice)
4.7/5
(37)
Contingency planning is a functional area that primarily requires
computer security technical measures.
(True/False)
4.9/5
(35)
A flaw or weakness in a system's design,implementation,or operation and management that could be exploited to violate the system's security policy is a(n)__________.
(Multiple Choice)
4.9/5
(38)
________ assures that a system performs its intended function in an unimpaired manner,free from deliberate or inadvertent unauthorized manipulation of the system.
(Multiple Choice)
4.8/5
(38)
__________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity,availability,and confidentiality of information system resources.
(Essay)
4.8/5
(29)
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
(Multiple Choice)
4.9/5
(30)
Misappropriation and misuse are attacks that result in ________ threat consequences.
(Essay)
4.9/5
(28)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)