Filters
Question type

Study Flashcards

_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.


A) A public key infrastructure
B) Open key encryption
C) Secret key encryption
D) A private key infrastructure

Correct Answer

verifed

verified

Application-filtering firewalls are less expensive than packet-filtering firewalls.

Correct Answer

verifed

verified

In the context of security, _____ is an attack that takes advantage of the human element of security systems.


A) disk mirroring
B) weblogging
C) voice recognition
D) social engineering

Correct Answer

verifed

verified

In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:


A) a system quickly recovers in the event of a system failure or disaster.
B) the person using a credit card number is the card's legitimate owner.
C) the accuracy of information resources within an organization is maintained.
D) a system can easily be restored to operational status.

Correct Answer

verifed

verified

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

Correct Answer

verifed

verified

True

In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.


A) validity
B) confidentiality
C) integrity
D) availability

Correct Answer

verifed

verified

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.


A) risk assessment plan
B) systems engineering plan
C) disaster recovery plan
D) security compliance plan

Correct Answer

verifed

verified

Social engineering is an attack that takes advantage of the backdoors in security systems.

Correct Answer

verifed

verified

_____ is a commonly used encryption protocol that manages transmission security on the Internet.


A) Application Layer
B) Secure Sockets Layer
C) Transmission Control Protocol
D) User Datagram Protocol

Correct Answer

verifed

verified

Which of the following statements is true of application-filtering firewalls?


A) They are less secure than packet-filtering firewalls.
B) They filter viruses less effectively than packet-filtering firewalls.
C) They filter faster than packet-filtering firewalls.
D) They are more expensive than packet-filtering firewalls.

Correct Answer

verifed

verified

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.


A) reliability
B) confidentiality
C) integrity
D) availability

Correct Answer

verifed

verified

A level 1 security system is used to protect _____ against unauthorized access.


A) users' workstations
B) back-end systems
C) internal database servers
D) front-end servers

Correct Answer

verifed

verified

_____ uses a public key known to everyone and a private key known only to the recipient.


A) Symmetric encryption
B) Asymmetric encryption
C) Remote key encryption
D) Secret key encryption

Correct Answer

verifed

verified

When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.

Correct Answer

verifed

verified

__________is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.


A) Spoofing
B) Keystroke logging
C) Phishing
D) Pharming
E) Select

Correct Answer

verifed

verified

When a computer is infected by a virus, _____.


A) the system's disk access is fast
B) system updates are recommended often
C) some programs suddenly increase in size
D) the available memory space remains constant

Correct Answer

verifed

verified

C

Which of the following is a biometric security measure?


A) Terminal resource security
B) A corner bolt
C) A callback modem
D) Signature analysis

Correct Answer

verifed

verified

D

Which of the following is a nonbiometric security measure?


A) Electronic trackers
B) Retinal scanning
C) Callback modems
D) Signature analysis

Correct Answer

verifed

verified

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

Correct Answer

verifed

verified

In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.

Correct Answer

verifed

verified

Showing 1 - 20 of 84

Related Exams

Show Answer