Filters
Question type

Study Flashcards

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.


A) Symmetric encryption
B) Business continuity planning
C) An intrusion detection system
D) Terminal resource security

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Describe asymmetric encryption.

Correct Answer

verifed

verified

Asymmetric encryption uses two keys: a p...

View Answer

In the context of security threats,_____ takes advantage of the human element of security systems.


A) hand geometry
B) iris analysis
C) voice recognition
D) social engineering

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.


A) validity
B) confidentiality
C) integrity
D) availability

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Describe how blended threats work.

Correct Answer

verifed

verified

Blended threats search for vulnerabiliti...

View Answer

​In _____ encryption,the same key is used to encrypt and decrypt a message.


A) ​symmetric
B) ​asymmetric
C) ​synchronous
D) ​asynchronous

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

When does spoofing occur?


A) It occurs when an illegitimate program poses as a legitimate one.
B) It occurs when a comprehensive security plan is being developed.
C) It occurs when a word is converted into a digital pattern.
D) It occurs when a firewall rejects the incoming data packets.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a nonbiometric security measure?


A) Electronic trackers
B) Passwords
C) Firewalls
D) Signature analysis

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.

A) True
B) False

Correct Answer

verifed

verified

When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.

A) True
B) False

Correct Answer

verifed

verified

The main function of Cyber Incident Response Capability (CIRC) is to _____.


A) provide level 1 security
B) restrict access controls to unauthorized personnel
C) provide information on security incidents
D) create backdoors to bypass security protocols

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A _________ consists of self-propagating program code that is triggered by a specified time or event.


A) virus
B) mirror disk
C) cable shield
D) worm

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.


A) firewall
B) rootkit
C) intrusion detection system
D) electronic tracker

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

_____ is a computer crime that involves destroying or disrupting computer services.


A) Sabotage
B) Dumpster
C) Libel
D) Keystroke logging

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following is true of application-filtering firewalls?


A) They are more secure and flexible.
B) They control data traffic by configuring a router.
C) They act as an intermediary between two systems.
D) They can be used as a server to scan for malware and viruses.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

In data encryption,a(n) _____ enables users of the Internet to securely and privately exchange data through the use of a pair of keys.


A) public key infrastructure
B) asymmetric encryption
C) symmetric encryption
D) private key infrastructure

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.


A) validity
B) confidentiality
C) integrity
D) availability

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

List nine types of intentional computer and network threats.

Correct Answer

verifed

verified

Intentional computer and network threats...

View Answer

In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.


A) Trojan programs
B) worms
C) logic bombs
D) backdoors

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

How are identification (ID)badges used as a physical security measure against thefts?

Correct Answer

verifed

verified

ID badges are checked against ...

View Answer

Showing 21 - 40 of 108

Related Exams

Show Answer