ISM Cengage Quizzes – Questions & Accurate Solutions
____ is a method of access control that prevents unauthorized users from using
an unattended computer to access the network and data. Right Ans -
Terminal resource security
Which statement is true of application-filtering firewalls? Right Ans - They
are more expensive than packet-filtering firewalls.
The three important aspects of computer and network security,
confidentiality, integrity, and availability, are collectively referred to as the
CIA triangle. Right Ans - True
In the context of computer and network security, _____ means that a system
must not allow the disclosing of information by anyone who is not authorized
to access it. Right Ans - confidentiality
A _____ is a security threat that may launch a worm through a Trojan horse or
launch a denial-of-service attack at a targeted IP address. Right Ans -
Blended threat
An intrusion detection system (IDS) can protect networks against both
external and internal access. Right Ans - True
When an organization develops a comprehensive security plan, it should set
up a security committee with representatives from all departments as well as
upper management. Right Ans - True
In contrast to pharming, phishing involves hijacking an official Web site
address by hacking a Domain Name System server. Right Ans - False
The Committee on National Security Systems (CNSS) proposed a model
known as the _____ for evaluating information security. Right Ans -
McCumber cube
Which is a nonbiometric security measure? Right Ans - Callback modems
A _____ consists of self-propagating program code that is triggered by a
specified time or event. Right Ans - Virus
,In the context of computer and network security, _____ refers to the accuracy of
information resources within an organization. Right Ans - Integrity
A(n) _____ is a combination of hardware and software that acts as a filter or
barrier between a private network and external computers or networks.
Right Ans - firewall
_____, a recent cryptographic protocol, ensures data security and integrity over
public networks, such as the Internet. Right Ans - Transport Layer Security
In the context of firewall as a nonbiometric security measure, a _____ is
software that acts as an intermediary between two systems. Right Ans -
proxy server
A(n) _____contains code intended to disrupt a computer, network, or Web site
and is usually hidden inside a popular program. Right Ans - Trojan
program
_____ is an attempt to gain access to a network by posing as an authorized user
in order to find sensitive information, such as passwords and credit card
information. Right Ans - Spoofing
Which statement is true of asymmetric encryption? Right Ans - It requires
a large amount of processing power.
_____ is the unauthorized use of system data for personal gain, such as
transferring money from another's account or charging purchases to someone
else's account. Right Ans - Computer fraud
As a physical security measure, _____. Right Ans - electronic trackers are
attached to a computer at the power outlet
In a level 2 security system, _____ must be protected to ensure confidentiality,
accuracy, and integrity of data. Right Ans - back-end systems
_____ are an inexpensive way to secure a computer to a desktop or counter and
often have locks as an additional protection against theft. Right Ans -
Corner bolts
, In the event of a network attack or intrusion, a _____ lists the tasks that must be
performed by the organization to restore damaged data and equipment.
Right Ans - disaster recovery plan
_____ are usually placed in front of a firewall and can identify attack signatures,
trace patterns, generate alarms for a network administrator, and cause
routers to terminate connections with suspicious sources. Right Ans -
Intrusion detection systems
Application-filtering firewalls are less expensive than packet-filtering
firewalls. Right Ans - False
When a computer is infected by a virus, _____. Right Ans - some programs
suddenly increase in size
In the context of e-commerce transaction security measures, authentication is
a critical factor because it ensures that: Right Ans - the person using a
credit card number is the card's legitimate owner.
In the context of intentional computer and network threats, a _____ combines
the characteristics of computer viruses, worms, and other malicious codes
with vulnerabilities found on public and private networks. Right Ans -
blended threat
_____ is an example of antispyware software. Right Ans - STOPzilla
Which of the following is a biometric security measure? Right Ans -
Signature analysis
Data sent through a virtual private network (VPN) can be encrypted using the
_____. Right Ans - Layer Two Tunneling Protocol
When using mirror disks, if one of the two disks containing the same data fails,
the other disk also fails. Right Ans - False
Auction fraud is sending fraudulent e-mails that seem to come from legitimate
sources, such as a bank or university. Right Ans - False
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Zendaya. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $19.99. You're not tied to anything after your purchase.