Filters
Question type

Study Flashcards

A denial-of-service attack _____.


A) blocks traffic from any identified host or network
B) typically only affects military computers
C) compromises the integrity of information
D) prevents a host from performing its legitimate functions

Correct Answer

verifed

verified

Information security is defined as _____.


A) providing confidentiality,integrity and availability to information
B) encrypting information
C) hiding information
D) providing robust data storage of information

Correct Answer

verifed

verified

Vulnerabilities are _____.


A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy

Correct Answer

verifed

verified

Information security controls are commonly classified in the industry as _____.


A) confidentiality,integrity and availability controls
B) firewalls,passwords and anti-virus systems
C) militarized and de-militarized zones
D) procedural,physical and technical controls

Correct Answer

verifed

verified

Redundancy is _____.


A) scheduling periodic maintenance to improve availability
B) hiding information to provide confidentiality
C) the provision of surplus service capacity to improve availability
D) None of the above

Correct Answer

verifed

verified

Most commercial encryption technologies such as SSL and VPN _____.


A) combine the best features of symmetric and asymmetric key encryption
B) use only symmetric key encryption
C) use only asymmetric key encryption
D) allow the user to choose whether to use symmetric or asymmetric key encryption

Correct Answer

verifed

verified

In symmetric key encryption _____.


A) the key used for encryption is a mirror image of the key used for decryption
B) the same key is used for encryption and decryption
C) the key used for encryption is independent of the key used for decryption
D) None of the above

Correct Answer

verifed

verified

Authentication is _____.


A) hiding information
B) providing an alternate identity
C) the verification of a claimed identity
D) granting certain specific privileges over information to a user

Correct Answer

verifed

verified

Integrity is defined as _____.


A) maintaining restrictions on information to protect personal privacy
B) ensuring timely and reliable use of information
C) guarding against improper modification of information to ensure authenticity
D) None of the above

Correct Answer

verifed

verified

The limitations of firewalls include all the following except _____.


A) it is ineffective if an internal computer is compromised
B) it cannot protect services accessible from the Internet
C) it can block traffic from any identified host or network
D) its effectiveness depends upon the abilities of the administrator

Correct Answer

verifed

verified

C

In network security,a firewall is a device which lies between two networks and _____.


A) regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
B) regulates the movement of network administrators from the external network to the internal network
C) prevents fires in the external network from spreading to the internal network
D) None of the above

Correct Answer

verifed

verified

A

Authorization is _____.


A) hiding information
B) providing an alternate identity
C) the verification of a claimed identity
D) granting certain specific privileges over information to a user

Correct Answer

verifed

verified

In the context of network security,patching _____.


A) applies cosmetic changes to software
B) updates software to fix known software bugs
C) improves the look and feel of software
D) adds user friendly features to software

Correct Answer

verifed

verified

Threats are _____.


A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy

Correct Answer

verifed

verified

A mobile worker requires secure access to corporate business applications from his hotel room.The most suitable encryption technology for this purpose is _____.


A) Virtual Private Network VPN)
B) Transport Layer Security TLS)
C) Secure Shell SSH)
D) Digital Signature

Correct Answer

verifed

verified

Confidentiality is defined as _____.


A) guarding against improper modification of information to ensure authenticity
B) maintaining restrictions on information to protect personal privacy
C) ensuring timely and reliable use of information
D) None of the above

Correct Answer

verifed

verified

In the context of network security,the de-militarized zone _____.


A) is most useful in military networks
B) contains the organization's external services such as web and email servers
C) contains the organization's sensitive data
D) None of the above

Correct Answer

verifed

verified

Controls are _____.


A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy

Correct Answer

verifed

verified

C

All the following are properties of asymmetric key encryption except _____.


A) it makes it easy to exchange the encryption key
B) it uses two keys
C) it is computationally simple
D) the key used for encryption cannot be used for decryption

Correct Answer

verifed

verified

Encryption is the process of _____.


A) rendering information unreadable in such a way that authorized users may later make the information readable
B) adding a password to information
C) placing information behind a firewall
D) placing information in the de-militarized zone

Correct Answer

verifed

verified

Showing 1 - 20 of 25

Related Exams

Show Answer