Filters
Question type

Study Flashcards

Explain the use of callback modems as a nonbiometric security measure.

Correct Answer

verifed

verified

Callback modems verify whether a user's ...

View Answer

How is a sender notified of packet delivery using a packet-filtering firewall?

Correct Answer

verifed

verified

A packet-filtering firewall informs send...

View Answer

_____ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

Correct Answer

verifed

verified

Terminal r...

View Answer

A level 3 security system focuses on protecting _____.


A) back-end systems
B) corporate networks
C) users' work stations
D) front-end servers

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

An ideal password should be eight characters or longer.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a type of access control used to protect systems from unauthorized access?


A) Steel encasements
B) Passwords
C) Firewalls
D) Identification badges

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.


A) validity
B) confidentiality
C) integrity
D) availability

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Backup facilities should never be shared in an attempt to reduce costs.

A) True
B) False

Correct Answer

verifed

verified

_____ is a computer crime that involves destroying or disrupting computer services.


A) Sabotage
B) Slander
C) Libel
D) Keystroke logging

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.

A) True
B) False

Correct Answer

verifed

verified

Describe asymmetric encryption.

Correct Answer

verifed

verified

Asymmetric encryption uses two keys: a p...

View Answer

Data encryption transforms data into a scrambled form called ciphertext.

A) True
B) False

Correct Answer

verifed

verified

Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.

A) True
B) False

Correct Answer

verifed

verified

_____ take advantage of the human element of security systems.


A) Denial-of-service attacks
B) Trojan programs
C) Blended threats
D) Social engineering attacks

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Viruses can only be transmitted through sharing of infected files directly from one computer to another.

A) True
B) False

Correct Answer

verifed

verified

What are the functions of a computer emergency response team (CERT)?

Correct Answer

verifed

verified

Currently,CERT focuses on security breac...

View Answer

State any five physical security measures.

Correct Answer

verifed

verified

Common physical security measures can in...

View Answer

A(n) _____ consists of self-propagating program code that is triggered by a specified time or event.

Correct Answer

verifed

verified

_____ ensures data security and integrity over public networks,such as the Internet.


A) Transport Layer Security
B) Terminal Resource Security
C) Transmission Control Protocol
D) User Datagram Protocol

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is a nonbiometric security measure?


A) Electronic trackers
B) Passwords
C) Firewalls
D) Signature analysis

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Showing 81 - 100 of 100

Related Exams

Show Answer