Filters
Question type

Study Flashcards

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

Correct Answer

verifed

verified

Describe authentication and the most secure type of authentication.

Correct Answer

verifed

verified

Authentication is a method for confirmin...

View Answer

What is the recommended way to implement information security lines of defense?


A) People first, technology second
B) Technology first, people second
C) None of these
D) All of these

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.

Correct Answer

verifed

verified

____________ is the identification of a user based on a physical characteristic.

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

Summarize the five steps to creating an information security plan.

Correct Answer

verifed

verified

(1)Develop the information security poli...

View Answer

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?


A) Hactivist
B) Social engineering
C) Insiders
D) Virus

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

Which of the following does a firewall perform?


A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of these

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

List and describe the three primary security areas.

Correct Answer

verifed

verified

(1)Authentication and authorization - So...

View Answer

What attacks computer systems by transmitting a virus hoax,with a real virus attached?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

The information security plan ...

View Answer

If there is a security breach on your organizational information systems,which information security area is best suited to handle the breach?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

_______________ is a hacker with criminal intent.

Correct Answer

verifed

verified

What is spam?


A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of these

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 76

Related Exams

Show Answer