Filters
Question type

Study Flashcards

When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure. ​


A) fault-tolerant systems
B) vulnerability-evade systems
C) primary-defense systems
D) database-resilient systems

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?


A) Hand geometry
B) Fingerprint recognition
C) Vein analysis
D) Palm prints

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

A) True
B) False

Correct Answer

verifed

verified

In the context of security, _____ is an attack that takes advantage of the human element of security systems.


A) disk mirroring
B) weblogging
C) voice recognition
D) social engineering

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Briefly explain the McCumber cube.

Correct Answer

verifed

verified

Answers will vary.The Committee on Natio...

View Answer

_____ is a commonly used encryption protocol that manages transmission security on the Internet.


A) Application Layer
B) Secure Sockets Layer
C) Transmission Control Protocol
D) User Datagram Protocol

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When a computer is infected by a virus, _____.


A) the system's disk access is fast
B) system updates are recommended often
C) some programs suddenly increase in size
D) the available memory space remains constant

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

_____ uses a public key known to everyone and a private key known only to the recipient.


A) Symmetric encryption
B) Asymmetric encryption
C) Remote key encryption
D) Secret key encryption

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Describe how a virtual private network (VPN) works.

Correct Answer

verifed

verified

Answers will vary.A VPN provides a secur...

View Answer

In the context of intentional computer and network threats, describe how blended threats work.

Correct Answer

verifed

verified

Answers will vary.A blended threat is a ...

View Answer

In the context of intentional computer and network threats, social engineers protects the integrity of information resources.

A) True
B) False

Correct Answer

verifed

verified

_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.


A) Keystroke loggers
B) Spyware
C) Firmware
D) Script loggers

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following statements is true of application-filtering firewalls?


A) They are less secure than packet-filtering firewalls.
B) They filter viruses less effectively than packet-filtering firewalls.
C) They filter faster than packet-filtering firewalls.
D) They are more expensive than packet-filtering firewalls.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Discuss the guidelines for improving a firewall's capabilities.

Correct Answer

verifed

verified

Answers will vary.Guidelines for improvi...

View Answer

In the context of fault-tolerant systems, describe uninterruptible power supply (UPS).

Correct Answer

verifed

verified

Answers will vary.UPS is a backup power ...

View Answer

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.


A) back-end server
B) corporate network
C) user's work station
D) front-end server

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.


A) logic bomb
B) callback modem
C) proxy server
D) block multiplexer

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.

A) True
B) False

Correct Answer

verifed

verified

List the actions that a firewall can take after examining a packet.

Correct Answer

verifed

verified

Answers will vary.A firewall can examine...

View Answer

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:


A) in spear phishing, the attack is targeted toward a specific person or a group.
B) spear phishing involves monitoring and recording keystrokes.
C) in spear phishing, hackers capture and record network traffic.
D) spear phishing involves collecting sensitive information via phone calls.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 41 - 60 of 109

Related Exams

Show Answer