100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISM Cengage Quizzes – Questions & Accurate Solutions R363,41   Add to cart

Exam (elaborations)

ISM Cengage Quizzes – Questions & Accurate Solutions

 3 views  0 purchase
  • Course
  • CENGAGE
  • Institution
  • CENGAGE

ISM Cengage Quizzes – Questions & Accurate Solutions

Preview 3 out of 26  pages

  • August 30, 2024
  • 26
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CENGAGE
  • CENGAGE
avatar-seller
ISM Cengage Quizzes – Questions & Accurate Solutions

____ is a method of access control that prevents unauthorized users from using
an unattended computer to access the network and data. Right Ans -
Terminal resource security

Which statement is true of application-filtering firewalls? Right Ans - They
are more expensive than packet-filtering firewalls.

The three important aspects of computer and network security,
confidentiality, integrity, and availability, are collectively referred to as the
CIA triangle. Right Ans - True

In the context of computer and network security, _____ means that a system
must not allow the disclosing of information by anyone who is not authorized
to access it. Right Ans - confidentiality

A _____ is a security threat that may launch a worm through a Trojan horse or
launch a denial-of-service attack at a targeted IP address. Right Ans -
Blended threat

An intrusion detection system (IDS) can protect networks against both
external and internal access. Right Ans - True

When an organization develops a comprehensive security plan, it should set
up a security committee with representatives from all departments as well as
upper management. Right Ans - True

In contrast to pharming, phishing involves hijacking an official Web site
address by hacking a Domain Name System server. Right Ans - False

The Committee on National Security Systems (CNSS) proposed a model
known as the _____ for evaluating information security. Right Ans -
McCumber cube

Which is a nonbiometric security measure? Right Ans - Callback modems

A _____ consists of self-propagating program code that is triggered by a
specified time or event. Right Ans - Virus

,In the context of computer and network security, _____ refers to the accuracy of
information resources within an organization. Right Ans - Integrity

A(n) _____ is a combination of hardware and software that acts as a filter or
barrier between a private network and external computers or networks.
Right Ans - firewall

_____, a recent cryptographic protocol, ensures data security and integrity over
public networks, such as the Internet. Right Ans - Transport Layer Security

In the context of firewall as a nonbiometric security measure, a _____ is
software that acts as an intermediary between two systems. Right Ans -
proxy server

A(n) _____contains code intended to disrupt a computer, network, or Web site
and is usually hidden inside a popular program. Right Ans - Trojan
program

_____ is an attempt to gain access to a network by posing as an authorized user
in order to find sensitive information, such as passwords and credit card
information. Right Ans - Spoofing

Which statement is true of asymmetric encryption? Right Ans - It requires
a large amount of processing power.

_____ is the unauthorized use of system data for personal gain, such as
transferring money from another's account or charging purchases to someone
else's account. Right Ans - Computer fraud

As a physical security measure, _____. Right Ans - electronic trackers are
attached to a computer at the power outlet

In a level 2 security system, _____ must be protected to ensure confidentiality,
accuracy, and integrity of data. Right Ans - back-end systems

_____ are an inexpensive way to secure a computer to a desktop or counter and
often have locks as an additional protection against theft. Right Ans -
Corner bolts

, In the event of a network attack or intrusion, a _____ lists the tasks that must be
performed by the organization to restore damaged data and equipment.
Right Ans - disaster recovery plan

_____ are usually placed in front of a firewall and can identify attack signatures,
trace patterns, generate alarms for a network administrator, and cause
routers to terminate connections with suspicious sources. Right Ans -
Intrusion detection systems

Application-filtering firewalls are less expensive than packet-filtering
firewalls. Right Ans - False

When a computer is infected by a virus, _____. Right Ans - some programs
suddenly increase in size

In the context of e-commerce transaction security measures, authentication is
a critical factor because it ensures that: Right Ans - the person using a
credit card number is the card's legitimate owner.

In the context of intentional computer and network threats, a _____ combines
the characteristics of computer viruses, worms, and other malicious codes
with vulnerabilities found on public and private networks. Right Ans -
blended threat

_____ is an example of antispyware software. Right Ans - STOPzilla

Which of the following is a biometric security measure? Right Ans -
Signature analysis

Data sent through a virtual private network (VPN) can be encrypted using the
_____. Right Ans - Layer Two Tunneling Protocol

When using mirror disks, if one of the two disks containing the same data fails,
the other disk also fails. Right Ans - False

Auction fraud is sending fraudulent e-mails that seem to come from legitimate
sources, such as a bank or university. Right Ans - False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Zendaya. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R363,41. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83662 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Start selling
R363,41
  • (0)
  Buy now