A) A public key infrastructure
B) Open key encryption
C) Secret key encryption
D) A private key infrastructure
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) disk mirroring
B) weblogging
C) voice recognition
D) social engineering
Correct Answer
verified
Multiple Choice
A) a system quickly recovers in the event of a system failure or disaster.
B) the person using a credit card number is the card's legitimate owner.
C) the accuracy of information resources within an organization is maintained.
D) a system can easily be restored to operational status.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) validity
B) confidentiality
C) integrity
D) availability
Correct Answer
verified
Multiple Choice
A) risk assessment plan
B) systems engineering plan
C) disaster recovery plan
D) security compliance plan
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Application Layer
B) Secure Sockets Layer
C) Transmission Control Protocol
D) User Datagram Protocol
Correct Answer
verified
Multiple Choice
A) They are less secure than packet-filtering firewalls.
B) They filter viruses less effectively than packet-filtering firewalls.
C) They filter faster than packet-filtering firewalls.
D) They are more expensive than packet-filtering firewalls.
Correct Answer
verified
Multiple Choice
A) reliability
B) confidentiality
C) integrity
D) availability
Correct Answer
verified
Multiple Choice
A) users' workstations
B) back-end systems
C) internal database servers
D) front-end servers
Correct Answer
verified
Multiple Choice
A) Symmetric encryption
B) Asymmetric encryption
C) Remote key encryption
D) Secret key encryption
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spoofing
B) Keystroke logging
C) Phishing
D) Pharming
E) Select
Correct Answer
verified
Multiple Choice
A) the system's disk access is fast
B) system updates are recommended often
C) some programs suddenly increase in size
D) the available memory space remains constant
Correct Answer
verified
Multiple Choice
A) Terminal resource security
B) A corner bolt
C) A callback modem
D) Signature analysis
Correct Answer
verified
Multiple Choice
A) Electronic trackers
B) Retinal scanning
C) Callback modems
D) Signature analysis
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 84
Related Exams