Filters
Question type

Study Flashcards

Code Red,Melissa,and Sasser are examples of _____.


A) corner bolts
B) firewalls
C) cable shields
D) worms

Correct Answer

verifed

verified

A _____ is a type of an intentional computer and network threat.


A) latch
B) proxy server
C) backdoor
D) corner bolt

Correct Answer

verifed

verified

In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.


A) reliability
B) confidentiality
C) integrity
D) availability

Correct Answer

verifed

verified

_____ is the unauthorized use of system data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.


A) Computer fraud
B) Denial-of-service
C) Keystroke logging
D) Social engineering

Correct Answer

verifed

verified

When disaster strikes,an organization should contact the insurance company to resume normal operations as soon as possible.

Correct Answer

verifed

verified

A(n) _____ network is often used so that remote users have a secure connection to an organization's network.


A) biometric security
B) intrusion detection
C) virtual private
D) terminal resource 

Correct Answer

verifed

verified

A _____ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.


A) router threat
B) magnetic threat
C) signal threat
D) blended threat

Correct Answer

verifed

verified

Which statement is true of application-filtering firewalls?


A) They are less secure than packet-filtering firewalls.
B) They filter viruses less effectively than packet-filtering firewalls.
C) They filter faster than packet-filtering firewalls.
D) They are more expensive than packet-filtering firewalls.

Correct Answer

verifed

verified

In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.


A) validity
B) confidentiality
C) integrity
D) availability

Correct Answer

verifed

verified

Showing 101 - 109 of 109

Related Exams

Show Answer