Filters
Question type

Study Flashcards

A(n) _______ is a program or device that can monitor data traveling over a network.

Correct Answer

verifed

verified

What is social engineering?


A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?


A) Hactivist
B) Social engineering
C) Insiders
D) Virus

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Denial-of-service attack (DoS) _______________ a website with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

Intrusion detection software (IDS) searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.

Correct Answer

verifed

verified

Distributed denial-of-service attack (DDoS) attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.

Correct Answer

verifed

verified

Which of the following can be completed by encryption?


A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

Social engineering is using one's __________ skills to trick people into revealing access credentials or other information valuable to the attacker.

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) information security ____________ details how an organization will implement the information security policies.

Correct Answer

verifed

verified

Which of the following is a program or device that can monitor data traveling over a network?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

List and describe the three primary security areas.

Correct Answer

verifed

verified

(1) Authentication and authorization Som...

View Answer

Summarize the five steps to creating an information security plan.

Correct Answer

verifed

verified

Develop the information security policie...

View Answer

What is encryption?


A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Correct Answer

verifed

verified

Showing 41 - 60 of 80

Related Exams

Show Answer