Filters
Question type

Study Flashcards

Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.

Correct Answer

verifed

verified

Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.

Correct Answer

verifed

verified

How are computer viruses transmitted? Where do the most dangerous ones come from and what viruses pose the most risk to national security?

Correct Answer

verifed

verified

Viruses can be transmitted through a net...

View Answer

Application-filtering firewalls are less expensive than packet-filtering firewalls.

Correct Answer

verifed

verified

In the context of security threats,a _____ is a programming routine built into a system by its designer or programmer.


A) logic bomb
B) worm
C) virus
D) backdoor

Correct Answer

verifed

verified

Social engineering is an attack that takes advantage of the backdoors in security systems.

Correct Answer

verifed

verified

Identify an intentional security threat that is a type of Trojan program used to release a virus,worm,or other destructive code.


A) Logic bomb
B) Fingerprint
C) Blended threat
D) Backdoor

Correct Answer

verifed

verified

A

An intrusion detection system (IDS)can protect networks against both external and internal access.

Correct Answer

verifed

verified

True

Which of the following indicates that a computer might be affected by a virus?


A) When the disk access is fast
B) When there are familiar messages on the screen
C) When programs suddenly increase in size
D) When the available memory space remains constant

Correct Answer

verifed

verified

Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others.


A) Physical security measure
B) Firewall security measure
C) E-commerce security measure
D) Biometric security measure

Correct Answer

verifed

verified

D

State any five physical security measures.

Correct Answer

verifed

verified

Common physical security measures can in...

View Answer

Which of the following is a physical security measure?


A) Fitting electronic trackers to a computer
B) Restricting access through passwords
C) Filtering data packets using a firewall
D) Checking a user's signature

Correct Answer

verifed

verified

A(n) _________ program contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.


A) Trojan
B) antivirus
C) exit
D) legitimate

Correct Answer

verifed

verified

An intrusion detection system (IDS)cannot prevent denial-of-service (DoS)attacks.

Correct Answer

verifed

verified

_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.


A) Intrusion detection systems
B) Proxy servers
C) Physical security measures
D) Magnetic tapes

Correct Answer

verifed

verified

Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?


A) Plaintext
B) Cleartext
C) Codetext
D) Ciphertext

Correct Answer

verifed

verified

Which of the following is a biometric security measure?


A) Electronic tracker
B) Password
C) Firewall
D) Signature analysis

Correct Answer

verifed

verified

What is shoulder surfing? Provide an example.

Correct Answer

verifed

verified

Shoulder surfing-in other words,looking ...

View Answer

_________ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.


A) Computer fraud
B) Denial-of-service
C) Rootkit
D) Social engineering

Correct Answer

verifed

verified

In business continuity planning,a disaster recovery plan lists that backup facilities should never be shared in an attempt to reduce costs.

Correct Answer

verifed

verified

Showing 1 - 20 of 108

Related Exams

Show Answer