Filters
Question type

Study Flashcards

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

A) True
B) False

Correct Answer

verifed

verified

In the context of intentional computer and network threats,social engineers protects the integrity of information resources.

A) True
B) False

Correct Answer

verifed

verified

_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.


A) Corner bolts
B) Identification badges
C) Callback modems
D) Electronic trackers

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

In the context of intentional computer and network threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.


A) blended threat
B) mirror disk
C) backdoor threat
D) firewall

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Explain the use of callback modems as a nonbiometric security measure.

Correct Answer

verifed

verified

Answers will vary.A callback modem verif...

View Answer

_____ are usually placed in front of a firewall and can identify attack signatures,trace patterns,generate alarms for a network administrator,and cause routers to terminate connections with suspicious sources.


A) Intrusion detection systems
B) Proxy servers
C) Identification badges
D) Virtual private networks

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Which is a nonbiometric security measure?


A) Electronic trackers
B) Retinal scanning
C) Callback modems
D) Signature analysis

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.


A) Phishing
B) Keystroke logging
C) Spoofing
D) Pharming

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Briefly explain how packet-filtering firewalls work.

Correct Answer

verifed

verified

Answers will vary.Packet-filtering firew...

View Answer

Which of the following statements is true of a worm?


A) It is usually hidden inside a popular program,but it is not capable of replicating itself.
B) It floods a network or server with service requests to prevent legitimate users' access to the system.
C) It is an independent program that can spread itself without attaching itself to a host program.
D) It enables a system designer to bypass the security of a system and sneak back into the system later to access files.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

_____,a recent cryptographic protocol,ensures data security and integrity over public networks,such as the Internet.


A) Transport Layer Security
B) Terminal Resource Security
C) Transmission Control Security
D) User Datagram Security

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which statement is true of phishing?


A) It involves monitoring and recording keystrokes.
B) It involves sending fraudulent e-mails that seem to come from legitimate sources.
C) It consists of self-propagating program code that is triggered by a specified time or event.
D) It prevents the disclosure of information to anyone who is not authorized to access it.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

The process of capturing and recording network traffic is referred to as _____.


A) sniffing
B) phishing
C) bombing
D) pharming

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A _____ consists of self-propagating program code that is triggered by a specified time or event.


A) virus
B) mirror disk
C) cable shield
D) backdoor

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In the context of computer and network security,a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.


A) integrity
B) confidentiality
C) validity
D) availability

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

In some instances,after examining an incoming packet,a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.

A) True
B) False

Correct Answer

verifed

verified

Briefly list some of the indications of a computer being infected by a virus.

Correct Answer

verifed

verified

Answers will vary.The following list des...

View Answer

In data encryption,the https in a browser address bar indicates a safe HTTP connection over _____.


A) Secure Sockets Layer
B) Transport Layer Security
C) User Datagram Protocol
D) Transmission Control Protocol

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

_____ is an example of antispyware software.


A) STOPzilla
B) AndroZip
C) Tumblr
D) Dogpile

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.


A) sniffing
B) screening
C) pharming
D) cybersquatting

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 81 - 100 of 109

Related Exams

Show Answer