Deck 5: Protecting Information Resources

Full screen (f)
exit full mode
Question
An intrusion detection system (IDS)can protect networks against both external and internal access.
Use Space or
up arrow
down arrow
to flip the card.
Question
An intrusion detection system (IDS)cannot prevent denial-of-service (DoS)attacks.
Question
Social engineering is an example of an unintentional security threat.
Question
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Question
Viruses can only be transmitted through sharing of infected files directly from one computer to another.
Question
Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
Question
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Question
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
Question
A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
Question
In the context of security,social engineering protects the integrity of information resources.
Question
After examining an incoming packet,a firewall cannot reject that packet.
Question
Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.
Question
If a drive in a redundant array of independent disks (RAID)system fails,data stored on it can be reconstructed from data stored on the remaining drives.
Question
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
Question
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
Question
In the context of the CIA triangle,part of ensuring integrity is identifying authorized users and granting them access privileges.
Question
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
Question
Application-filtering firewalls are less expensive than packet-filtering firewalls.
Question
Social engineering is an attack that takes advantage of the backdoors in security systems.
Question
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
Question
A _____ travels from computer to computer in a network but it does not usually erase data.

A)worm
B)virus
C)Trojan horse
D)logic bomb
Question
To ensure confidentiality,accuracy,and integrity of data,a level 2 security system protects _____.

A)back-end systems
B)simple systems
C)complex systems
D)front-end systems
Question
A level 3 security system focuses on protecting _____ against intrusion,denial-of-service attacks,and unauthorized access.

A)back-end systems
B)corporate networks
C)users' work stations
D)front-end servers
Question
Which of the following indicates that a computer might be affected by a virus?

A)When the disk access is fast
B)When there are familiar messages on the screen
C)When programs suddenly increase in size
D)When the available memory space remains constant
Question
A level 1 security system is used to protect _____ against unauthorized access.

A)users' work stations
B)corporate networks
C)internal database servers
D)front-end servers
Question
The cost of setting up a virtual private network (VPN)is usually high.
Question
What is Spyware?

A)Spyware is software that secretly gathers information about users while they browse the Web.
B)Spyware is an attack that floods a server or a network.
C)Spyware is an encryption security that manages transmission security on the Internet.
D)Spyware is a type of Trojan program.
Question
In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

A)validity
B)confidentiality
C)integrity
D)availability
Question
_____ is the process of capturing and recording network traffic.

A)Sniffing
B)Phishing
C)Spoofing
D)Pharming
Question
Which of the following is true of a worm?

A)It is an independent program that can spread itself without attaching itself to a host program.
B)It is transmitted through a network or through e-mail attachments.
C)It is a self-propagating program code that is triggered by a specific time or event.
D)It enables the designer to bypass the system security and sneak back into the system later to access files.
Question
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.

A)Kernel
B)Spyware
C)Spam
D)Jira
Question
_____ is a computer crime that involves destroying or disrupting computer services.

A)Sabotage
B)Dumpster
C)Libel
D)Keystroke logging
Question
In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.

A)validity
B)confidentiality
C)integrity
D)availability
Question
In business continuity planning,a disaster recovery plan lists that backup facilities should never be shared in an attempt to reduce costs.
Question
When does spoofing occur?

A)It occurs when an illegitimate program poses as a legitimate one.
B)It occurs when a comprehensive security plan is being developed.
C)It occurs when a word is converted into a digital pattern.
D)It occurs when a firewall rejects the incoming data packets.
Question
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.

A)sniffing
B)screening
C)pharming
D)cybersquatting
Question
Which of the following is true of phishing?

A)It involves sending fraudulent e-mails that seem to come from legitimate sources.
B)It increases the speed of a system by reading universal product codes.
C)It monitors and records keystrokes and can be software or hardware devices.
D)It attempts to gain access to a network by posing as an authorized user.
Question
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.

A)validity
B)confidentiality
C)integrity
D)availability
Question
An ideal password should be eight characters or longer.
Question
The Committee on National Security Systems (CNSS)proposed another model for evaluating information security known as the _____.

A)McCumber cube
B)top-level domain (TLD)
C)Porter's model
D)CIA triad
Question
Which of the following is a biometric security measure?

A)Electronic tracker
B)Password
C)Firewall
D)Signature analysis
Question
In physical security measures,using _____ is an inexpensive way to secure a computer to a counter.

A)corner bolts
B)steel encasements
C)callback modems
D)passwords
Question
A(n)_____ is often used so remote users have a secure connection to an organization's network.

A)biometric security network
B)intrusion detection network
C)virtual private network
D)terminal resource network
Question
In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.

A)Trojan programs
B)worms
C)logic bombs
D)backdoors
Question
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

A)Intrusion detection systems
B)Proxy servers
C)Physical security measures
D)Magnetic tapes
Question
Which of the following is considered an intentional security threat?

A)Floods
B)Structural failures
C)Backdoors
D)Power outages
Question
Which of the following is a type of access control used to protect systems from unauthorized access?

A)Steel encasements
B)Passwords
C)Firewalls
D)Identification badges
Question
In the context of security threats,_____ takes advantage of the human element of security systems.

A)hand geometry
B)iris analysis
C)voice recognition
D)social engineering
Question
Which of the following is a physical security measure?

A)Fitting electronic trackers to a computer
B)Restricting access through passwords
C)Filtering data packets using a firewall
D)Checking a user's signature
Question
In the context of security threats,a _____ is a programming routine built into a system by its designer or programmer.

A)logic bomb
B)worm
C)virus
D)backdoor
Question
Which of the following is a nonbiometric security measure?

A)Electronic trackers
B)Passwords
C)Firewalls
D)Signature analysis
Question
In the context of security threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

A)magnetic disk
B)denial-of-service attack
C)backdoor
D)mirror disk
Question
Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others.

A)Physical security measure
B)Firewall security measure
C)E-commerce security measure
D)Biometric security measure
Question
In the context of security threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

A)blended threat
B)mirror disk
C)backdoor
D)magnetic disk
Question
_____ is an example of a biometric security measure.

A)Hand geometry
B)Firewalls
C)Callback modems
D)Passwords
Question
_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.

A)Nonbiometric
B)Physiological
C)Biometric
D)Physical
Question
Identify a true statement about firewalls.

A)Firewalls protect against external access and not from internal intrusions.
B)Firewalls can identify attack signatures,trace patterns,and generate alarms for the network administrator.
C)Firewalls monitor network traffic and use the "prevent,detect,and react" approach to security.
D)Firewalls cause routers to terminate connections with suspicious sources.
Question
Identify an intentional security threat that is a type of Trojan program used to release a virus,worm,or other destructive code.

A)Logic bomb
B)Fingerprint
C)Blended threat
D)Backdoor
Question
Which of the following is true of application-filtering firewalls?

A)They are more secure and flexible.
B)They control data traffic by configuring a router.
C)They act as an intermediary between two systems.
D)They can be used as a server to scan for malware and viruses.
Question
In nonbiometric security measure,a _____ is a software that acts as an intermediary between two systems.

A)database
B)backdoor
C)proxy server
D)Trojan program
Question
_________ is a form of spyware that collects information about a user (without the user's consent)to determine which advertisements to display in the user's Web browser.

A)Adware
B)Malware
C)Freeware
D)Hardware
Question
When planning a comprehensive security system,the first step is designing _________,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

A)fault-tolerant systems
B)vulnerability-evade systems
C)primary-defense systems
D)database-resilient systems
Question
_________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.

A)Spoofing
B)Keystroke logging
C)Phishing
D)Pharming
Question
_____ encryption is also known as secret key encryption.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
Question
_____ is a commonly used encryption protocol that manages transmission security on the Internet.

A)Application Layer
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
Question
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.

A)risk assessment
B)systems engineering
C)disaster recovery
D)security compliance
Question
_________ is software that secretly gathers information about users while they browse the Web.

A)Spyware
B)Firmware
C)Freeware
D)Malware
Question
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

A)Symmetric encryption
B)Business continuity planning
C)An intrusion detection system
D)Terminal resource security
Question
In data encryption,the https indicates a safe HTTP connection over _____.

A)Secure Sockets Layer
B)Transport Layer Security
C)User Datagram Protocol
D)Transmission Control Protocol
Question
_____ encryption uses a public key known to everyone and a private key known only to the recipient.​

A)​Symmetric
B)​Asymmetric
C)​Synchronous
D)​Asynchronous
Question
_________ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.

A)Computer fraud
B)Denial-of-service
C)Rootkit
D)Social engineering
Question
​In _____ encryption,the same key is used to encrypt and decrypt a message.

A)​symmetric
B)​asymmetric
C)​synchronous
D)​asynchronous
Question
Data sent through a virtual private network (VPN)can be encrypted using the _____.

A)User Datagram Protocol
B)Transmission Control Protocol
C)Host Identity Protocol
D)Layer Two Tunneling Protocol
Question
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?

A)Plaintext
B)Cleartext
C)Codetext
D)Ciphertext
Question
_________ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

A)Phishing
B)Spyware
C)Confidentiality
D)Public key encryption
Question
_____ encryption usually works better for public networks,such as the Internet.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
Question
The main function of Cyber Incident Response Capability (CIRC)is to _____.

A)provide level 1 security
B)restrict access controls to unauthorized personnel
C)provide information on security incidents
D)create backdoors to bypass security protocols
Question
_________ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

A)Keystroke loggers
B)Worms
C)Magnetic tapes
D)Mirror disks​
Question
In data encryption,a(n)_____ enables users of the Internet to securely and privately exchange data through the use of a pair of keys.

A)public key infrastructure
B)asymmetric encryption
C)symmetric encryption
D)private key infrastructure
Question
In data encryption,_____ ensures data security and integrity over public networks,such as the Internet.

A)Transport Layer Security
B)Terminal Resource Security
C)Transmission Control Security
D)User Datagram Security
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/108
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Protecting Information Resources
1
An intrusion detection system (IDS)can protect networks against both external and internal access.
True
2
An intrusion detection system (IDS)cannot prevent denial-of-service (DoS)attacks.
False
3
Social engineering is an example of an unintentional security threat.
False
4
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
5
Viruses can only be transmitted through sharing of infected files directly from one computer to another.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
6
Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
7
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
8
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
9
A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
10
In the context of security,social engineering protects the integrity of information resources.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
11
After examining an incoming packet,a firewall cannot reject that packet.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
12
Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
13
If a drive in a redundant array of independent disks (RAID)system fails,data stored on it can be reconstructed from data stored on the remaining drives.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
14
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
15
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
16
In the context of the CIA triangle,part of ensuring integrity is identifying authorized users and granting them access privileges.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
17
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
18
Application-filtering firewalls are less expensive than packet-filtering firewalls.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
19
Social engineering is an attack that takes advantage of the backdoors in security systems.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
20
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
21
A _____ travels from computer to computer in a network but it does not usually erase data.

A)worm
B)virus
C)Trojan horse
D)logic bomb
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
22
To ensure confidentiality,accuracy,and integrity of data,a level 2 security system protects _____.

A)back-end systems
B)simple systems
C)complex systems
D)front-end systems
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
23
A level 3 security system focuses on protecting _____ against intrusion,denial-of-service attacks,and unauthorized access.

A)back-end systems
B)corporate networks
C)users' work stations
D)front-end servers
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following indicates that a computer might be affected by a virus?

A)When the disk access is fast
B)When there are familiar messages on the screen
C)When programs suddenly increase in size
D)When the available memory space remains constant
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
25
A level 1 security system is used to protect _____ against unauthorized access.

A)users' work stations
B)corporate networks
C)internal database servers
D)front-end servers
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
26
The cost of setting up a virtual private network (VPN)is usually high.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
27
What is Spyware?

A)Spyware is software that secretly gathers information about users while they browse the Web.
B)Spyware is an attack that floods a server or a network.
C)Spyware is an encryption security that manages transmission security on the Internet.
D)Spyware is a type of Trojan program.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
28
In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

A)validity
B)confidentiality
C)integrity
D)availability
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
29
_____ is the process of capturing and recording network traffic.

A)Sniffing
B)Phishing
C)Spoofing
D)Pharming
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is true of a worm?

A)It is an independent program that can spread itself without attaching itself to a host program.
B)It is transmitted through a network or through e-mail attachments.
C)It is a self-propagating program code that is triggered by a specific time or event.
D)It enables the designer to bypass the system security and sneak back into the system later to access files.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
31
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.

A)Kernel
B)Spyware
C)Spam
D)Jira
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
32
_____ is a computer crime that involves destroying or disrupting computer services.

A)Sabotage
B)Dumpster
C)Libel
D)Keystroke logging
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
33
In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.

A)validity
B)confidentiality
C)integrity
D)availability
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
34
In business continuity planning,a disaster recovery plan lists that backup facilities should never be shared in an attempt to reduce costs.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
35
When does spoofing occur?

A)It occurs when an illegitimate program poses as a legitimate one.
B)It occurs when a comprehensive security plan is being developed.
C)It occurs when a word is converted into a digital pattern.
D)It occurs when a firewall rejects the incoming data packets.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
36
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.

A)sniffing
B)screening
C)pharming
D)cybersquatting
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is true of phishing?

A)It involves sending fraudulent e-mails that seem to come from legitimate sources.
B)It increases the speed of a system by reading universal product codes.
C)It monitors and records keystrokes and can be software or hardware devices.
D)It attempts to gain access to a network by posing as an authorized user.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
38
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.

A)validity
B)confidentiality
C)integrity
D)availability
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
39
An ideal password should be eight characters or longer.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
40
The Committee on National Security Systems (CNSS)proposed another model for evaluating information security known as the _____.

A)McCumber cube
B)top-level domain (TLD)
C)Porter's model
D)CIA triad
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is a biometric security measure?

A)Electronic tracker
B)Password
C)Firewall
D)Signature analysis
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
42
In physical security measures,using _____ is an inexpensive way to secure a computer to a counter.

A)corner bolts
B)steel encasements
C)callback modems
D)passwords
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
43
A(n)_____ is often used so remote users have a secure connection to an organization's network.

A)biometric security network
B)intrusion detection network
C)virtual private network
D)terminal resource network
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
44
In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.

A)Trojan programs
B)worms
C)logic bombs
D)backdoors
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
45
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

A)Intrusion detection systems
B)Proxy servers
C)Physical security measures
D)Magnetic tapes
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is considered an intentional security threat?

A)Floods
B)Structural failures
C)Backdoors
D)Power outages
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a type of access control used to protect systems from unauthorized access?

A)Steel encasements
B)Passwords
C)Firewalls
D)Identification badges
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
48
In the context of security threats,_____ takes advantage of the human element of security systems.

A)hand geometry
B)iris analysis
C)voice recognition
D)social engineering
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is a physical security measure?

A)Fitting electronic trackers to a computer
B)Restricting access through passwords
C)Filtering data packets using a firewall
D)Checking a user's signature
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
50
In the context of security threats,a _____ is a programming routine built into a system by its designer or programmer.

A)logic bomb
B)worm
C)virus
D)backdoor
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is a nonbiometric security measure?

A)Electronic trackers
B)Passwords
C)Firewalls
D)Signature analysis
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
52
In the context of security threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

A)magnetic disk
B)denial-of-service attack
C)backdoor
D)mirror disk
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
53
Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others.

A)Physical security measure
B)Firewall security measure
C)E-commerce security measure
D)Biometric security measure
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
54
In the context of security threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

A)blended threat
B)mirror disk
C)backdoor
D)magnetic disk
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
55
_____ is an example of a biometric security measure.

A)Hand geometry
B)Firewalls
C)Callback modems
D)Passwords
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
56
_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.

A)Nonbiometric
B)Physiological
C)Biometric
D)Physical
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
57
Identify a true statement about firewalls.

A)Firewalls protect against external access and not from internal intrusions.
B)Firewalls can identify attack signatures,trace patterns,and generate alarms for the network administrator.
C)Firewalls monitor network traffic and use the "prevent,detect,and react" approach to security.
D)Firewalls cause routers to terminate connections with suspicious sources.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
58
Identify an intentional security threat that is a type of Trojan program used to release a virus,worm,or other destructive code.

A)Logic bomb
B)Fingerprint
C)Blended threat
D)Backdoor
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is true of application-filtering firewalls?

A)They are more secure and flexible.
B)They control data traffic by configuring a router.
C)They act as an intermediary between two systems.
D)They can be used as a server to scan for malware and viruses.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
60
In nonbiometric security measure,a _____ is a software that acts as an intermediary between two systems.

A)database
B)backdoor
C)proxy server
D)Trojan program
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
61
_________ is a form of spyware that collects information about a user (without the user's consent)to determine which advertisements to display in the user's Web browser.

A)Adware
B)Malware
C)Freeware
D)Hardware
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
62
When planning a comprehensive security system,the first step is designing _________,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

A)fault-tolerant systems
B)vulnerability-evade systems
C)primary-defense systems
D)database-resilient systems
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
63
_________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.

A)Spoofing
B)Keystroke logging
C)Phishing
D)Pharming
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
64
_____ encryption is also known as secret key encryption.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
65
_____ is a commonly used encryption protocol that manages transmission security on the Internet.

A)Application Layer
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
66
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.

A)risk assessment
B)systems engineering
C)disaster recovery
D)security compliance
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
67
_________ is software that secretly gathers information about users while they browse the Web.

A)Spyware
B)Firmware
C)Freeware
D)Malware
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
68
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

A)Symmetric encryption
B)Business continuity planning
C)An intrusion detection system
D)Terminal resource security
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
69
In data encryption,the https indicates a safe HTTP connection over _____.

A)Secure Sockets Layer
B)Transport Layer Security
C)User Datagram Protocol
D)Transmission Control Protocol
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
70
_____ encryption uses a public key known to everyone and a private key known only to the recipient.​

A)​Symmetric
B)​Asymmetric
C)​Synchronous
D)​Asynchronous
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
71
_________ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.

A)Computer fraud
B)Denial-of-service
C)Rootkit
D)Social engineering
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
72
​In _____ encryption,the same key is used to encrypt and decrypt a message.

A)​symmetric
B)​asymmetric
C)​synchronous
D)​asynchronous
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
73
Data sent through a virtual private network (VPN)can be encrypted using the _____.

A)User Datagram Protocol
B)Transmission Control Protocol
C)Host Identity Protocol
D)Layer Two Tunneling Protocol
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?

A)Plaintext
B)Cleartext
C)Codetext
D)Ciphertext
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
75
_________ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

A)Phishing
B)Spyware
C)Confidentiality
D)Public key encryption
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
76
_____ encryption usually works better for public networks,such as the Internet.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
77
The main function of Cyber Incident Response Capability (CIRC)is to _____.

A)provide level 1 security
B)restrict access controls to unauthorized personnel
C)provide information on security incidents
D)create backdoors to bypass security protocols
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
78
_________ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

A)Keystroke loggers
B)Worms
C)Magnetic tapes
D)Mirror disks​
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
79
In data encryption,a(n)_____ enables users of the Internet to securely and privately exchange data through the use of a pair of keys.

A)public key infrastructure
B)asymmetric encryption
C)symmetric encryption
D)private key infrastructure
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
80
In data encryption,_____ ensures data security and integrity over public networks,such as the Internet.

A)Transport Layer Security
B)Terminal Resource Security
C)Transmission Control Security
D)User Datagram Security
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 108 flashcards in this deck.