Exam 1: Computer Systems Overview
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The assurance that data received are exactly as sent by an authorized entity is __________.
(Multiple Choice)
4.9/5
(34)
Establishing, maintaining, and implementing plans for emergency response, backup operations, and post disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations is a __________ plan.
(Short Answer)
4.9/5
(30)
__________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.
(Short Answer)
4.8/5
(41)
X.800 architecture was developed as an international standard andfocuses on security in the context of networks and communications.
(True/False)
4.9/5
(44)
A(n) _________ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
(Short Answer)
4.8/5
(37)
A loss of _________ is the disruption of access to or use of information or an information system.
(Short Answer)
4.7/5
(26)
A threat action in which sensitive data are directly released to an unauthorized entity is __________.
(Multiple Choice)
4.7/5
(29)
Replay, masquerade, modification of messages, and denial of service are example of _________ attacks.
(Short Answer)
4.8/5
(28)
Confidentiality, Integrity, and Availability form what is often referred to as the _____.
(Short Answer)
4.7/5
(35)
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
(Multiple Choice)
4.9/5
(42)
A(n) _________ is any means taken to deal with a security attack.
(Short Answer)
4.9/5
(43)
The first step in devising security services and mechanisms is todevelop a security policy.
(True/False)
4.9/5
(30)
The more critical a component or service, the higher the level ofavailability required.
(True/False)
4.8/5
(30)
Security mechanisms typically do not involve more than one particularalgorithm or protocol.
(True/False)
4.8/5
(30)
A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.
(Multiple Choice)
4.8/5
(28)
In the United States, student grade information is an asset whose confidentiality is regulated by the __________.
(Essay)
4.9/5
(36)
A(n) _________ assessment is periodically assessing the risk to organizational operations, organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission or organizational information.
(Short Answer)
5.0/5
(33)
Many security administrators view strong security as an impediment toefficient and user-friendly operation of an information system.
(True/False)
4.9/5
(42)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)