A) blocks traffic from any identified host or network
B) typically only affects military computers
C) compromises the integrity of information
D) prevents a host from performing its legitimate functions
Correct Answer
verified
Multiple Choice
A) providing confidentiality,integrity and availability to information
B) encrypting information
C) hiding information
D) providing robust data storage of information
Correct Answer
verified
Multiple Choice
A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy
Correct Answer
verified
Multiple Choice
A) confidentiality,integrity and availability controls
B) firewalls,passwords and anti-virus systems
C) militarized and de-militarized zones
D) procedural,physical and technical controls
Correct Answer
verified
Multiple Choice
A) scheduling periodic maintenance to improve availability
B) hiding information to provide confidentiality
C) the provision of surplus service capacity to improve availability
D) None of the above
Correct Answer
verified
Multiple Choice
A) combine the best features of symmetric and asymmetric key encryption
B) use only symmetric key encryption
C) use only asymmetric key encryption
D) allow the user to choose whether to use symmetric or asymmetric key encryption
Correct Answer
verified
Multiple Choice
A) the key used for encryption is a mirror image of the key used for decryption
B) the same key is used for encryption and decryption
C) the key used for encryption is independent of the key used for decryption
D) None of the above
Correct Answer
verified
Multiple Choice
A) hiding information
B) providing an alternate identity
C) the verification of a claimed identity
D) granting certain specific privileges over information to a user
Correct Answer
verified
Multiple Choice
A) maintaining restrictions on information to protect personal privacy
B) ensuring timely and reliable use of information
C) guarding against improper modification of information to ensure authenticity
D) None of the above
Correct Answer
verified
Multiple Choice
A) it is ineffective if an internal computer is compromised
B) it cannot protect services accessible from the Internet
C) it can block traffic from any identified host or network
D) its effectiveness depends upon the abilities of the administrator
Correct Answer
verified
Multiple Choice
A) regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
B) regulates the movement of network administrators from the external network to the internal network
C) prevents fires in the external network from spreading to the internal network
D) None of the above
Correct Answer
verified
Multiple Choice
A) hiding information
B) providing an alternate identity
C) the verification of a claimed identity
D) granting certain specific privileges over information to a user
Correct Answer
verified
Multiple Choice
A) applies cosmetic changes to software
B) updates software to fix known software bugs
C) improves the look and feel of software
D) adds user friendly features to software
Correct Answer
verified
Multiple Choice
A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy
Correct Answer
verified
Multiple Choice
A) Virtual Private Network VPN)
B) Transport Layer Security TLS)
C) Secure Shell SSH)
D) Digital Signature
Correct Answer
verified
Multiple Choice
A) guarding against improper modification of information to ensure authenticity
B) maintaining restrictions on information to protect personal privacy
C) ensuring timely and reliable use of information
D) None of the above
Correct Answer
verified
Multiple Choice
A) is most useful in military networks
B) contains the organization's external services such as web and email servers
C) contains the organization's sensitive data
D) None of the above
Correct Answer
verified
Multiple Choice
A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy
Correct Answer
verified
Multiple Choice
A) it makes it easy to exchange the encryption key
B) it uses two keys
C) it is computationally simple
D) the key used for encryption cannot be used for decryption
Correct Answer
verified
Multiple Choice
A) rendering information unreadable in such a way that authorized users may later make the information readable
B) adding a password to information
C) placing information behind a firewall
D) placing information in the de-militarized zone
Correct Answer
verified
Showing 1 - 20 of 25
Related Exams